G06F11/3428

RUNTIME ENTROPY-BASED SOFTWARE OPERATORS
20230048137 · 2023-02-16 ·

A system may include a historical managed software system data store that contains electronic records associated with controllers and deployed workloads (each electronic record may include time series data representing performance metrics). An entropy calculation system, coupled to the historical managed software system data store, may calculate at least one historical entropy value based on information in the historical managed software system data store. A detection engine, coupled to a monitored system currently executing a deployed workload in the cloud computing environment, may collect time series data representing current performance metrics associated with the monitored system. The detection engine may then calculate a current monitored entropy value (based on the collected time series data representing current performance metrics) and (iii) compare the current monitored entropy value with a threshold value (based on the historical entropy value). Based on the comparison, a corrective action for the monitored system may be triggered.

Systems and methods for local randomized benchmarking

Systems and methods for estimating a property of an error in a circuit implemented on an n-qubit quantum system are provided, where the circuit comprises a gate set that comprises a first subset (custom character) and a second subset (custom character) of elementary gates. The first subset comprises a third subset (custom character) of elementary gates each of which consists of an n-fold tensor product of a plurality of single qubit gates. A first procedure is executed that comprises preparing the system in a state ψ and then applying D.sub.1=T.sub.1 to the system. The procedure further comprises, for each respective clock cycle t in clock cycles t∈{2, . . . , m+1}, (a) applying H to the system, where H is an elementary gate in the second subset, and then (b) applying a gate D.sub.t=T.sub.tGHT.sub.t−1.sup.†H.sup.† to the system, where D.sub.t is an element of the first subset. The procedure further comprises performing a measurement readout R. The procedure is repeated for one or more values of {right arrow over (T)} or one or more states ψ or one or more measurement readout procedures R, where m is a positive integer greater than 1, G is an element of the first subset of elementary gates, {right arrow over (T)}=(T.sub.1, . . . , T.sub.m, T.sub.m+1=I), and T.sub.1, . . . , T.sub.m are elements of custom character, with the proviso that n>2.

Selectively enabling features based on rules

Aspects of the present disclosure involve a system and method for performing operations comprising providing to a client device, a messaging application comprising multiple features; accessing a configuration rule that associates a device property rule with a feature; determining at a first point in time, that a property of the client device matches the device property rule associated with the configuration rule; in response to determining that the property of the client device matches the device property rule associated with the configuration rule, enabling the feature on the client device at the first point in time; receiving an updated property of the client device at a second point in time; and in response to determining that the updated property of the client device fails to match the device property rule associated with the configuration rule at the second point in time, disabling the feature on the client device.

MEMORY DEVICE DEGRADATION MONITORING
20230009637 · 2023-01-12 ·

A memory circuit which includes: A synchronous memory cell array, configured to receive a clock signal and having address lines and bit lines. A margin agent, determining a status of the synchronous memory cell array based on a time duration between a transition of the clock signal and a change on a signal derived from a bit line due to a signaling on at least one of the address lines. In another aspect, a memory cell, having a bit line configured to provide data input/output to the memory cell may be provided with a comparator, comparing a voltage on the bit line with a reference voltage and indicating of a status of the memory cell thereby. Firmware may receive the indication of the status of a memory cell array, and transmit the indication, issue an alert, and/or reconfigure the memory circuit responsive to the status.

USING MACHINE LEARNING FOR AUTOMATICALLY GENERATING A RECOMMENDATION FOR A CONFIGURATION OF PRODUCTION INFRASTRUCTURE, AND APPLICATIONS THEREOF
20230011315 · 2023-01-12 · ·

Systems, methods and media are directed to automatically generating a recommendation. Data describing a configuration of a production infrastructure is received, the production infrastructure running the system operating in the production environment. One or more metrics data values indicative of a performance of the system operating in the production environment is retrieved. Expected performance values of the system are received. An augmented decisioning engine compares the metrics data values with the expected performance values. The augmented decisioning engine is trained to provide a recommended configuration of the production infrastructure. Based on the comparing, the augmented decisioning engine is trained to improve subsequent recommendations of configuration of the production infrastructure through a feedback process. The augmented decisioning engine is adjusted based on an indication of whether the configuration of production infrastructure satisfies a threshold metric data value in response to the production infrastructure running the system operating in a production environment.

Systems and methods for managing a highly available distributed hybrid transactional and analytical database

Systems and methods for managing a highly available distributed hybrid database comprising: a memory storing instructions; and one or more processors configured to execute the instructions to: receive a query from a user device to retrieve data from a distributed database comprising a source node, a first plurality of replica nodes, and a second plurality of replica nodes, wherein the source node and the first plurality of replica nodes form a transactional cluster, and wherein the second plurality of replica nodes forms an analytical cluster; determine whether to process the query using the transactional cluster or the analytical cluster based on one or more rules; translate the query into a first protocol that the determined cluster comprehends; select a replica node corresponding to the determined cluster; process the query using the selected replica node; and send data associated with results from processing the query to the user device.

Method for testing a microservice application

Provided is a method for testing a microservice application with at least one microservice with at least one application programming interface, including: reading characteristic data of the application programming interface of the microservice of the microservice application and ascertaining at least one endpoint of the application programming interface; automatically generating an execution script on the basis of the characteristic data of the application programming interface; automatically generating a test infrastructure, wherein the test infrastructure includes at least one client entity; executing the execution script and transmitting the data query of the execution script by the client entity to the application programming interface of the microservice and receiving corresponding response data of the microservice by the client entity; and ascertaining the transfer characteristic by the client entity.

Dynamically mapping software infrastructure utilization

A computer-based system and method for real-time monitoring of computer resource usage, including obtaining, by a monitoring application executed by a processor, from a plurality of applications, each application executed by a processor, a report upon the accessing of at least one accessed resource by at least one accessing user; and generating, by the monitoring application based on the report, a map of resources accessed by the plurality of applications. If a notification that a resource has been compromised is obtained, a list of all applications that have accessed the resource may be generated based on the map.

Cache optimization for web sites running A/B test

Systems and methods for cache optimization are disclosed. A request for a user interface is received from a first user device. The request includes a user key. An interface key corresponding to an interface template of the requested user interface is generated from the user key. The interface template of the requested user interface is loaded. The interface template includes one or more edge side include (ESI) identifiers in the interface template. An element key corresponding to a first ESI element associated with a first of the one or more ESI identifiers is generated from the user key. The first ESI element is loaded and positioned at a location within the interface template identified by the first of the one or more ESI identifiers. A complete user interface is provided to the first user device. The complete user interface includes the interface template having the first ESI element positioned therein.

Job performance breakdown

A system and method for processing application performance using application phase differentiation and detection is disclosed. Phase detection may be accomplished in a number of different ways, including by using a deterministic algorithm that looks for changes in the computing resource utilization patterns (as detected in the performance data collected). Machine learning (ML) and neural networks (e.g. sparse auto encoder SAE) may also be used. Performance data is aggregated according to phase and stored in a database along with additional application and computing system information. This database may then be used to find similar applications for performance prediction.