G06F11/22

Remote debug for scaled computing environments

Techniques and apparatus for remotely accessing debugging resources of a target system are described. A target system including physical compute resources, such as, processors and a chipset can be coupled to a controller remotely accessible over a network. The controller can be arranged to facilitate remote access to debug resources of the physical compute resources. The controller can be coupled to debug pin, such as, those of a debug port and arranged to assert control signals on the pins to access debug resources. The controller can also be arranged to exchange information elements with a remote debug host to include indication of debug operations and/or debug results.

Systems, methods, and apparatuses for detecting and creating operation incidents

Techniques for determining insight are described. An exemplary method includes receiving a request to provide insight into potential abnormal behavior; receiving one or more of anomaly information and event information associated with the potential abnormal behavior; evaluating the received one or more of the anomaly information and event information associated with the abnormal behavior to determine there is insight as to what is causing the potential abnormal behavior and to add to an insight at least two of an indication of a metric involved in the abnormal behavior, a severity for the insight indication, an indication of a relevant event involved in the abnormal behavior, and a recommendation on how to cure the potential abnormal behavior; and providing an insight indication for the generated insight.

Modular power network device
11593238 · 2023-02-28 · ·

A modular system is described which can provide high frequency monitoring of power use and responsive control as well as enabling network connectivity for centralised monitoring and operation. One modular system consists of a communications bus, end caps, and a combination of the modules providing communications, power metering, relay control and battery backup. Each modular system can be configured with a combination of modular units as needed for the application. A combination of bus communication monitoring and tilt detection provides security against external tampering after installation.

Validation of cross logical groups in a network

Disclosed are systems, methods, and computer-readable media for assuring tenant forwarding in a network environment. Network assurance can be determined in layer 1, layer 2 and layer 3 of the networked environment including, internal-internal (e.g., inter-fabric) forwarding and internal-external (e.g., outside the fabric) forwarding in the networked environment. The network assurance can be performed using logical configurations, software configurations and/or hardware configurations.

Predicting and resolving issues within a telecommunication network
11595288 · 2023-02-28 · ·

Disclosed here is a system to automatically predict and resolve issues within a telecommunication network. Initially, the system builds a service registry to store dependence information within the network, which can include software components and hardware components. Various components of the network create logs of their operations. Machine learning models examine the logs and detect any issues. Upon detecting an issue or abnormal event, the system can automatically resolve the issue by determining the most similar issue occurring previously and determining a solution that resolved the previous most similar issue. In addition, the system can propagate the fix to dependent systems and/or notify the dependent systems of the issue.

Servicing data storage devices in a data storage array

Systems and methods for replacing and testing a data storage device are disclosed. In disclosed embodiments, a system including a data storage array (DSA) including a plurality of data storage devices (DSDs) in an enclosure. The system further includes an I/O server coupling the DSA to a client node and configured to provide data access between the client node and the DSA. The system further includes a management server coupled to the DSA, configured to detect a failed DSD in the DSA, detect a replacement DSD in the enclosure that replaces the failed DSD, and add the replacement DSD to a logical path of the DSA. The management server is further configured to display an indication of a state of the DSA based on the comparing.

SCAN TOPOLOGY DISCOVERY IN TARGET SYSTEMS
20180003769 · 2018-01-04 ·

Topology discovery of a target system having a plurality of components coupled with a scan topology may be performed by driving a low logic value on the data input signal and a data output signal of the scan topology. An input data value and an output data value for each of the plurality of components is sampled and recorded. A low logic value is then scanned through the scan path and recorded at each component. The scan topology may be determined based on the recorded data values and the recorded scan values.

ON-CHIP MONITOR CIRCUIT AND SEMICONDUCTOR CHIP

Provided is an on-chip monitor circuit mounted on a semiconductor chip that is equipped with a security function module for performing a security function process on an input signal and outputting a security function signal, the on-chip monitor circuit comprising a monitor circuit for monitoring signal waveforms of the semiconductor chip, wherein the circuit is provided with a first storage means for storing data that designates a window period in which to perform a test of the semiconductor chip, and a control means for performing control to operate the circuit during the window period, when a prescribed test signal is inputted to the security function module. By using the on-chip monitor circuit in a semiconductor chip of which security is required, security attacks, e.g., a Trojan horse or the like, intended to embed a malicious circuit in the production stage of security function module-equipped semiconductors chips, can be prevented.

Methods, systems, and computer readable media for smart network interface card testing

Methods, systems, and computer readable media for smart network interface card testing are disclosed. One example method occurs at a network interface card (NIC) comprising a network processing unit executing a monitoring agent for monitoring data traversing the NIC. The method includes obtaining, from a test system or a test traffic generator, at least one test packet; generating, using the monitoring agent, NIC processing information associated with processing the at least one test packet, wherein generating the NIC processing information includes monitoring application layer events, presentation layer events, session layer events, transport layer events, network layer events, driver layer events, kernel layer events, or other events involving the NIC and generating the NIC processing information using the monitored events; and storing or providing the NIC processing information for data analysis.

IDENTIFYING AND CONFIGURING MULTIPLE SMART DEVICES ON A CAN BUS
20180013578 · 2018-01-11 · ·

A system for communicating over a Controller Area Network (CAN) bus may include a central controller and a plurality of smart devices communicatively coupled with the central controller over the CAN bus and over an identification verification network separate from the CAN bus. Each smart device may be configured to at least one of measure various parameters and control a function based on a command received from the central controller, and then communicate one or more signals indicative of at least one of the measured parameters and the function over the CAN bus to the central controller. Each of the smart devices may include a physical input, a physical output, and at least two nonvolatile memory locations. A first of the at least two memory locations may be configured to store an identifier input signal received at the physical input from at least one of the central controller and an upstream smart device over the identification verification network, the identifier input signal being stored by the smart device as a function instance value for the smart device. The smart device may further include a source address determination module configured to determine a source address for the smart device based on the function instance value and a factory default base address for the smart device, and store the source address in a second of the at least two memory locations.