Patent classifications
G06F2201/81
DATACENTER DASHBOARD WITH TEMPORAL FEATURES
A system and method for monitoring performance of an industrial process includes an input port for receiving signals representative of one or more performance parameters generated by the industrial process, a user interface including a display and a controller that is operably coupled with the input port and the user interface. The controller is configured to repeatedly receive signals over time via the input port representative of the one or more performance parameters of the industrial process and to generate a plurality of snapshots, wherein each snapshot includes a graphical representation of the one or more performance parameters of the industrial process at a corresponding time. The controller is configured to generate an animatable heat map including two or more of the plurality of snapshots arranged temporally and to display the animatable heat map on the display.
INTELLIGENT CLOUD SERVICE HEALTH COMMUNICATION TO CUSTOMERS
Example aspects include techniques for accurate and expeditious cloud service health communication to customers. These techniques may include determining that a service health incident has customer impact, the service health incident corresponding to an outage of one or more services of a cloud computing platform, identifying a plurality of customers impacted by the service health incident, and predicting, based on the service health incident and one or more other service health incidents, aggregated incident information identifying a plurality of service health incidents associated with the outage of the one or more services. In addition, the techniques may include identifying the one or more services associated with the service health incident, and transmitting, based at least in part on the aggregated incident information and the one or more services, a health notification to the plurality of customers.
TECHNIQUES FOR MANAGING TEMPORARILY RETIRED BLOCKS OF A MEMORY SYSTEM
Methods, systems, and devices for techniques for managing temporarily retired blocks of a memory system are described. In some examples, aspects of a memory system or memory device may be configured to determine an error for a block of memory cells. For example, a controller may determine an existence of the error and may temporarily retire the block. A media management operation may be performed on the temporarily retired block and, depending on one or more characteristics of the error, the temporarily retired block may be enabled or retired.
SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO A DATABASE
Systems and methods for throttling requests submitted to a database are designed to maximize the rate at which information can be obtained from the database. In the throttling methods, the time required for the database to perform a certain operation is monitored. If the time required to perform the operation exceeds a threshold time period, a request limit is imposed on the database, the request limit limiting the number of data read and/or write requests that can be submitted to the database per unit of time.
Artificial Intelligence Engine Providing Automated Error Resolution
Aspects of the disclosure relate to automated error processing. A computing platform may receive historical error/solution information. The computing platform may train, using the historical error/solution information, an artificial intelligence engine to automatically identify solutions for current errors for a plurality of users. The computing platform may identify current errors for a user of the plurality of users. The computing platform may notify the user of the current errors. The computing platform may receive a request to correct an error of the one or more current errors. The computing platform may identify, using the artificial intelligence engine, a solution to the error. The computing platform may automatically perform actions to achieve the solution. The computing platform may send, after performing the actions, commands directing an event processing system to process an event with which the error was associated, which may cause the event processing system to process the event.
RUNTIME ENTROPY-BASED SOFTWARE OPERATORS
A system may include a historical managed software system data store that contains electronic records associated with controllers and deployed workloads (each electronic record may include time series data representing performance metrics). An entropy calculation system, coupled to the historical managed software system data store, may calculate at least one historical entropy value based on information in the historical managed software system data store. A detection engine, coupled to a monitored system currently executing a deployed workload in the cloud computing environment, may collect time series data representing current performance metrics associated with the monitored system. The detection engine may then calculate a current monitored entropy value (based on the collected time series data representing current performance metrics) and (iii) compare the current monitored entropy value with a threshold value (based on the historical entropy value). Based on the comparison, a corrective action for the monitored system may be triggered.
Systems, methods, and apparatus for software defined silicon security
Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) for software defined silicon security are disclosed. Example apparatus include a trusted agent determiner to (i) determine respective reputation scores associated with a plurality of agents in a mesh network, the plurality of agents associated with a plurality of semiconductor devices, respective ones of the semiconductor devices including circuitry configurable to provide one or more features, and (ii) select, based on the respective reputation scores, a first agent from the plurality of the agents to transmit a request to activate or deactivate at least one of the one or more features. Example apparatus also include an agent interface to, in response to the request, broadcast an activation or deactivation of the least one of the one or more features to the mesh network to cause the trusted agent determiner to update the reputation score of the first agent.
Cross cluster replication
Methods and systems for cross cluster replication are provided. Exemplary methods include: periodically requesting by a follower cluster history from a leader cluster, the history including at least one operation and sequence number pair, the operation having changed data in a primary shard of the leader cluster; receiving history and a first global checkpoint from the leader cluster; when a difference between the first global checkpoint and a second global checkpoint exceeds a user-defined value, concurrently making multiple additional requests for history from the leader cluster; and when a difference between the first global checkpoint and the second global checkpoint is less than a user-defined value, executing the at least one operation, the at least one operation changing data in a primary shard of the follower cluster, such that an index of the follower cluster replicates an index of the leader cluster.
Dynamic graphical processing unit register allocation
Systems, apparatuses, and methods for dynamic graphics processing unit (GPU) register allocation are disclosed. A GPU includes at least a plurality of compute units (CUs), a control unit, and a plurality of registers for each CU. If a new wavefront requests more registers than are currently available on the CU, the control unit spills registers associated with stack frames at the bottom of a stack since they will not likely be used in the near future. The control unit has complete flexibility determining how many registers to spill based on dynamic demands and can prefetch the upcoming necessary fills without software involvement. Effectively, the control unit manages the physical register file as a cache. This allows younger workgroups to be dynamically descheduled so that older workgroups can allocate additional registers when needed to ensure improved fairness and better forward progress guarantees.
Validating and estimating runtime for quantum algorithms
A method for validation and runtime estimation of a quantum algorithm includes receiving a quantum algorithm and simulating the quantum algorithm, the quantum algorithm forming a set of quantum gates. The method further includes analyzing a first set of parameters of the set of quantum gates and analyzing a second set of parameters of a set of qubits performing the set of quantum gates. The method further includes transforming, in response to determining at least one of the first set of parameters or the second set of parameters meets an acceptability criterion, the quantum algorithm into a second set of quantum gates.