Patent classifications
G06Q30/012
UNIVERSAL WARRANTY EXCHANGE PROTOCOL FOR UNSUPPORTED TECHNOLOGIES
Systems and methods are disclosed for consolidating warranty information for IHS components from multiple vendors. A service module or agent component running on an operating system works with a baseboard management controller to retrieve warranty information. A Universal Warranty Data Definition (UWDD) model is used to represent warranty information for components from various vendors. A Warranty Exchange Protocol (WEP) is used to exchange warranty information with vendors using the UWDD model. Vendors establish a website that implements the Warranty Exchange Protocol. When a vendor's components are installed in an IHS, a UWDD plugin for the service module provides information associated with the vendor's UWDD website, such as a website URI and access credentials. The baseboard management controller uses the UWDD plugin information to collect warranty information for the components and to present the warranty information to a data center administrator.
Account Based Handset Protection Coverage
Methods and means for device account based protection coverage are provided which allow for account holders to share a protection plan across a shared account, thereby covering a plurality of individual devices and discreet devices. Program users are able to manage their device protection in a manner more consistent with the way they use their device and services. Users are also able to purchase rate-tailored protection plans for all (or some) of the plurality of devices tied to the account, thereby facilitating cost-sharing of service fees with other members associated with the account. Account members can also share claims benefits across the protected group.
SYSTEMS AND METHODS FOR WARRANTY RECOMMENDATION USING MULTI-LEVEL COLLABORATIVE FILTERING
Systems and methods are disclosed for warranty recommendations for users based upon warranty selections of peer users. The users are clustered into peer groups based upon industry or market segment based upon user data including primary variables, such as workload type data and market segment data, and secondary variables, such as virtual machine size or number, cluster size, cost, and downtime. New users are matched to a top similar user within their peer group based upon a vector distance, wherein the vector comprises the primary and secondary variables. A current warranty of the top similar user is recommended to the new user. Warranty changes by members of a peer group cause trigger an updated ranking of the peer group warranties. Expert user comments and rankings are used to generate expert user recommendations. A cost-based impact assessment may also be used for warranty recommendations by highlighting favorable and unfavorable warranty properties.
SYSTEM AND METHOD FOR PROVIDING INTELLIGENT ASSISTANCE USING A WARRANTY BOT
Systems and methods are disclosed for a specialized warranty bot that can interact with users to evaluate warranty coverage. A warranty interpreter interprets warranty aspects of a given system and converts the warranty terms it into human understandable text. A situation analyzer enhances warranty interpretation by scanning logs across various components that are covered by the warranty and identifying whether the current problems are covered by the warranty. Assessment guidance processing anticipates questions from the customer and provides information regarding why a problem may not be covered by the warranty. Using a solution advisor, based on the problem details and historical analysis, the warranty bot provides insights regarding potential minimum time for resolution of a problem in order to assist the user to decide whether the system needs to be isolated or if the system can remain in production in a non-critical path.
SYSTEM AND METHOD FOR WARRANTY CUSTOMIZATION BASED ON DEVICE LOCATION AND PROXIMITY TO SERVICE CENTER
Custom-tailored warranties are provided with improved service level agreements (SLA) based upon an estimated turnaround time for service and/or parts. The turnaround time is calculated using an artificial intelligence or machine learning engine considering parameters such as the transit time from the nearest service centers and warehouses, the availability of service engineers at the service centers, and the availability of replacement parts in the warehouse. A custom-tailored warranty also may be offered for a specific customer-selected SLA if supported by the estimated turnaround time for the location. A warranty recommendation may be based on device location for data centers in multiple locations. A Location-Based Warranty Monitor (LBWM) provides fine-grained warranty suggestions and Un-bound Warranty Tokens (UWTs) can be bound to a system to assign a warranty with a desired. SLA.
Optimizing website environments
Provided are methods for optimizing presentation of additional items on web page based on item already presented on the web page. A method can include identifying first set of templates. The method can further include, for each of first plurality of requests, selecting first template, selecting first item, transmitting the first template to first client computer, and receiving interaction data from the first client computer specifying one or more interactions with the first template. The method can further include analyzing the interaction data to determine performance metric for each of the first set of templates and replacing at least one or more of the first set of templates and the first item. The method can further include, for each of second plurality of requests, selecting second template, selecting second item, and transmitting the second template to the second client computer. Presentation of additional items can be optimized remotely and automatically.
Terminal device, product warranty application system, warranty application validity checking method, and warranty application validity checking program
Based on the identification number of completely wireless earphones entered into an input unit, a checking unit of a terminal device checks whether or not conditions regarding an expiration period and the number of times of use for an exchange service for exchanging one of the pair that is not lost with left and right earphones are satisfied. A display control unit causes a display unit to display a message with an instruction to return the earphone that is not lost when the conditions are satisfied.
AUTOMATICALLY EVICTING AN OWNER OF A SECURITY PROCESSOR
Embodiments of systems and methods for automatically evicting an owner of a security processor are described. In some embodiments, a security processor may include: a core and a memory coupled to the core, the memory having program instructions stored thereon that, upon execution by the core, cause the security processor to: determine that a secure boot public key last used by a first entity to bootstrap an Information Handling System (IHS) fails to bootstrap the IHS; in response to the determination, identify another secure boot public key usable by a second entity to bootstrap the IHS; and in response to the security processor being in a factory environment, increment a counter associated with the first entity to evict the first entity in favor of the second entity.
SYSTEM AND METHOD TO PREDICT AND PREVENT CUSTOMER CHURN IN SERVICING BUSINESS
A system and method for minimizing customer churn in device service businesses commences with execution of a customer service contract. Ongoing customer data capture is made for each contract. Customer data includes contract events, environmental events, service events, device usage analytics and personnel events. Machine learning is applied to captured customer data, which machine learning is based on a state of customer data at the time of contract determination. Customer data is assigned weights, and aggregate data for each customer is compared to a preselected threshold level. Customers above a threshold are deemed happy and customers below the threshold are deemed to be at risk. Remedial measures relative to at risk customer data generates remedial measure suggestions.
INDICATING A TYPE OF SECURE BOOT TO ENDPOINT DEVICES BY A SECURITY PROCESSOR
Embodiments of systems and methods for indicating a type of secure boot to endpoint devices by a security processor are described. In some embodiments, a security processor may include: a core and a memory coupled to the core, the memory having program instructions stored thereon that, upon execution by the core, cause the security processor to: identify a type of secure boot last performed to bootstrap an Information Handling System (IHS); and make an indication of the type of secure boot available to a host processor or Baseboard Management Controller (BMC) of the IHS.