G06F11/2289

Validation of cross logical groups in a network

Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations.

LIVE EDIT OF CONFIGURATION MANAGEMENT EXECUTION
20230236845 · 2023-07-27 ·

Systems and methods for configuration file editing during the execution of the configuration process can include initiating a configuration process using a configuration file referencing a sequence of tasks and receiving a command to edit the configuration file. They can also include, responsive to the receipt of the command, pausing the configuration process and modifying one or more tasks in the sequence of tasks to generate a modified configuration file. They can further include resuming the configuration process using the modified configuration file from a point at which the execution was paused.

Polling method and system for server sensors, and related apparatus

A polling method for server sensors, a polling system for server sensors, and a computer-readable memory medium. The polling method includes: when a BMC is activated, acquiring attribute information of sensors (S101); classifying the sensors according to polling cycles in the attribute information (S102); adding the sensors with the same polling cycle into a same preset data structure (S103); and polling the sensors in the preset data structure using a thread (S104). According to the method, the problem of low polling efficiency caused by polling sensors with different cycles using a single thread may be solved, and each sensor may be polled independently while minimizing influences between polling of the sensors.

Generating configuration corrections for applications using a classifier model
11520602 · 2022-12-06 · ·

Methods and systems for detecting and responding to erroneous application configurations are presented. In one embodiment, a method is provided that includes receiving a configuration for an application and receiving execution metrics for the application. The configuration and the execution metrics may be compared to a knowledge base of reference configurations and reference execution metrics and a particular reference configuration may be identified from the knowledge base that corresponds to the configuration. The particular reference configuration may represent an erroneous configuration of the application that needs to be corrected. A configuration correction may then be identified based on the particular reference configuration.

Device and method for verifying a component of a storage device

A storage device configured for hardware verification is disclosed. The storage device comprises a first hardware component comprising a connector and a first verification logic. The first validation logic is configured to detect a criterion and generate a first signal via the connector in response to detecting the criterion. The storage device also comprises a second hardware component coupled to the first hardware component via the connector. The second hardware component comprises a second validation logic, where the second validation logic is configured to monitor and receive the first signal via the connector. In response to receiving the first signal, the second validation logic is configured to compare the received first signal to an expected signal and generate a result. The storage device is configured to take an action in response to the result.

Detecting resource redundancy and conflicts in a heterogeneous computing environment

Detecting resource errors in a heterogeneous computing environment is provided. A plurality of individual resource dependency graphs corresponding to a plurality of computing systems that comprise the heterogeneous computing environment is consolidated to form a consolidated resource dependency graph. An analysis of respective nodes representing respective resources of the heterogeneous computing environment in the consolidated resource dependency graph is performed to identify a resource error caused by a new resource being added to a computing system of the plurality of computing systems based on defined rule sets. It is determined whether the new resource causes an error to sibling resources at a same level under a parent resource in the consolidated resource dependency graph based on the analysis. In response to determining that the new resource does not cause an error to the sibling resources, the new resource is deployed in the computing system of the heterogeneous computing environment.

Technologies for re-programmable hardware in autonomous vehicles

Techniques are disclosed herein for reconfiguring reprogrammable hardware in an autonomous vehicle system. According to an embodiment, an autonomous driving system includes sensors and a configurable circuit having physical logic units. The autonomous driving system aggregates data observed from each of the sensors. The autonomous driving system detects a trigger indicative of a defect in the configurable circuit. The defect is identified as a function of the aggregated data. The autonomous driving system performs, in response to the trigger, a reconfiguration action on the configurable circuit to repair the defect.

Detecting Resource Redundancy and Conflicts in a Heterogeneous Computing Environment

Detecting resource errors in a heterogeneous computing environment is provided. A plurality of individual resource dependency graphs corresponding to a plurality of computing systems that comprise the heterogeneous computing environment is consolidated to form a consolidated resource dependency graph. An analysis of respective nodes representing respective resources of the heterogeneous computing environment in the consolidated resource dependency graph is performed to identify a resource error caused by a new resource being added to a computing system of the plurality of computing systems based on defined rule sets. It is determined whether the new resource causes an error to sibling resources at a same level under a parent resource in the consolidated resource dependency graph based on the analysis. In response to determining that the new resource does not cause an error to the sibling resources, the new resource is deployed in the computing system of the heterogeneous computing environment.

Configuration drift management tool
11616692 · 2023-03-28 · ·

A system includes one or more databases configured to store at least one configuration rule and one or more processors in communication with the databases. The processors may be configured to compare a product parameter to configuration rules to determine a drift item based on a current value of the product parameter being different than acceptable values defined by a test specified by the configuration rule, the test comprising one of a plurality of test types. The processors may be further configured to store, based on a determination that the drift item is not in a drift database of the databases, the drift item in a database, receive a record of one or more actions performed to resolve the drift item, and in response to receipt of the record, modify a status of the drift item from unresolved to resolved in the database.

Global inline name space verification for distributed file systems

Embodiments for providing global inline name space verification for a distributed file system in a network of a metadata server coupled to a plurality of data servers by taking a global dataless snapshot of a namespace of the distributed file system; walking all of the files in the namespace for each data server and the metadata server to generate parsed information; combining, by an XOR operation, the parsed information into data blocks for each server; obtaining a checksum of each data block of the data blocks; comparing actual and expected checksums from the metadata server and all of the data servers; and generating an alert if a comparison of any actual and expected checksums do not match.