Entries |
Document | Title | Date |
20110041015 | DETECTING SOFTWARE RACE CONDITIONS - Detecting a race condition is disclosed. An indication of a store operation to a memory address is received. An identifier of the memory address is stored. The identifier is used to detect an occurrence of a memory operation that is not associated with a previous ordering operation. | 02-17-2011 |
20110072313 | SYSTEM FOR PROVIDING FAULT TOLERANCE FOR AT LEAST ONE MICRO CONTROLLER UNIT - The invention relates to a system for providing fault tolerance for at least one micro controller unit, hereinafter called MCU ( | 03-24-2011 |
20110072314 | COMPUTER SYSTEM AND MONITORING DEVICE - A computer system and a monitoring device for a computer system are disclosed. The computer system includes a plurality of electronic modules, a memory module and an embedded controller. The embedded controller is coupled to the electronic modules and the memory module, respectively. The embedded controller collects information of the electronic modules and generates the system information about the electronic modules. The embedded controller selectively writes the system information into the memory module. The system information in the memory module can be provided to the user or the maintenance engineer for system analysis. Besides, the computer system may utilize an application program to monitor the system information, so as to achieve the error prevention and alert function. | 03-24-2011 |
20110072315 | System and Method for Multivariate Quality-of-Service Aware Dynamic Software Rejuvenation - A method for monitoring the quality-of-service (QoS) of high priority transactions in a software system includes receiving a specific QoS metric of a high priority transaction, where the QoS metric associated with a plurality of buckets and comparing the sampled specific QoS metric to an expected value for the specific QoS metric. If the sampled specific QoS metric exceeds the corresponding expected value, a bucket for the specific QoS metric is incremented, otherwise the bucket is decremented. If the bucket for the specific QoS metric overflows, the current bucket is reinitialized to zero, a depth of a next bucket for the specific QoS metric is computed, and a number of standard deviations from a mean value for the specific QoS metric is incremented. When the bucket for the specific QoS metric exceeds a threshold, a software rejuvenation routine is executed. | 03-24-2011 |
20110083046 | HIGH AVAILABILITY OPERATOR GROUPINGS FOR STREAM PROCESSING APPLICATIONS - One embodiment of a method for providing failure recovery for an application that processes stream data includes providing a plurality of operators, each of the operators comprising a software element that performs an operation on the stream data, creating one or more groups, each more groups including a subset of the operators, assigning a policy to each of the groups, the policy comprising a definition of how the subset of the operators will function in the event of a failure, and enforcing the policy through one or more control elements that are interconnected with the operators. | 04-07-2011 |
20110126059 | System Monitoring - Disclosed are methods, systems and products, including a method that includes monitoring one or more service providing components implemented using at least one processor-based device, the one or more service providing components being connected to an interfacing system configured to control requests for service received from client units that require servicing from at least one of the one or more service providing components. The interfacing system is also configured to assign the requests to the one or more service providing components. The monitoring is initiated by equipment associated with one or more of the interfacing system and at least one of the one or more service providing components. The method also includes generating information regarding the operability of at least one of the one or more service providing components based on data generated in response to monitoring the one or more service providing components. | 05-26-2011 |
20110145657 | INTEGRATED FORENSICS PLATFORM FOR ANALYZING IT RESOURCES CONSUMED TO DERIVE OPERATIONAL AND ARCHITECTURAL RECOMMENDATIONS - A method for facilitating forensic analysis of operational data for an IT infrastructure includes deriving performance data from a plurality of physical systems, network elements and storage devices in an IT infrastructure via a toolset comprising a plurality of IT monitoring and metrics tools, importing the performance data into an integrated forensics platform, aggregating the imported data, and analyzing the aggregated data to determine resources consumed. Each tool is communicatively interfaced with one or more of the physical systems, network elements and storage devices. | 06-16-2011 |
20110145658 | ELECTRONIC APPARATUS AND METHOD OF CONTROLLING ELECTRONIC APPARATUS - An electronic apparatus is provided. A main control section outputs data including fiscal information input from an interface. A recording control section is connected to the main control section. The recording control section controls a recording section on the basis of the data output from the main control section to issue a receipt. A memory control section is connected to the main control section and a memory. The memory control section reads and writes the fiscal information from and to the memory under the control of the main control section. When the data is input to the main control section from the interface, the main control section controls the memory control section to write the fiscal data to the memory. A log creation section creates a log that the main control section controls the memory control section to read the fiscal information from the memory. | 06-16-2011 |
20110154124 | METHOD AND DEVICE FOR PREVENTING FAILURE - The method of tracking the evolution of a physical quantity comprises:
| 06-23-2011 |
20110161741 | TOPOLOGY BASED CORRELATION OF THRESHOLD CROSSING ALARMS - Method, apparatus and computer program product for correlating performance events in a data processing system. A first event is received at one of a first device and a second device of the data processing system, and a second event is received at one of the first device and the second device. A type of a connection between the first device and the second device is identified to form an identified type of connection, and a relationship between the first event and the second event is determined based on the identified type of connection between the first device and the second device. | 06-30-2011 |
20110179313 | System and Method for Correlating Empirical Data with User Experience - A method includes receiving at a computing system empirical data related to one or more information technology entities. The method further includes receiving at the computing system one or more user experience indicators, the user experience indicators indicative of a user's experience using a computer application. The method further includes correlating by the computing system the empirical data with the one or more user experience indicators to determine a quality of service delivered to a user for a plurality of time periods. The method further includes determining by the computing system, based on the correlation, whether one or more issues with one of the one or more information technology entities are related to the quality of service delivered to the user. | 07-21-2011 |
20110219270 | METHOD AND APPARATUS FOR LOGGING SYSTEM CHARACTERISTIC DATA - A method for logging system characteristic data of a system is provided. The method includes receiving a plurality of system characteristic data points associated with a first time period of predetermined length, and generating a one or more first power sums from the plurality of system characteristic data points. | 09-08-2011 |
20110219271 | COMPUTER SYSTEM AND CONTROL METHOD OF THE SAME - A computer system functions to dynamically assign the storage capacity to the host computer. If an event such as a failure occurs in the logical resources, the performance requirements of the virtual volumes must be guaranteed to the host computer. | 09-08-2011 |
20110225462 | OPERATIONS MANAGEMENT APPARATUS, OPERATIONS MANAGEMENT SYSTEM, DATA PROCESSING METHOD, AND OPERATIONS MANAGEMENT PROGRAM - An operations management apparatus which acquires performance information for each of a plurality of performance items from a plurality of controlled units and manages operation of the controlled units includes a correlation model generation unit which derives a correlation function between a first series of performance information that indicates time series variation about a first element and a second series of performance information that indicates time series variation about a second element, generates a correlation model between the first element and the second element based on the correlation function, and obtains the correlation model for each element pair of the performance information, and a correlation change analysis unit which analyzes a change in the correlation model based on the performance information acquired newly which has not been used for generation of the correlation model. | 09-15-2011 |
20110239054 | INFORMATION PROCESSING APPARATUS AND SIGN OF FAILURE DETERMINATION METHOD - According to one embodiment, an information processing apparatus includes a disk drive, a monitoring processing module, and a log accumulation module. The monitoring processing module configured to monitor a command which is issued to the disk drive by a disk driver program in response to a disk access request from an operating system, and a response to the command from the disk drive, and to output command identification information indicating a type of the command and response identification information indicating success or failure of processing corresponding to the command executed by the disk drive. The log accumulation module configured to accumulate the command identification information and response identification information output from the monitoring processing module as log information of the disk drive. | 09-29-2011 |
20110246837 | SYSTEM OPERATIONS MANAGEMENT APPARATUS, SYSTEM OPERATIONS MANAGEMENT METHOD AND PROGRAM STORAGE MEDIUM - In a system operations management apparatus, a burden to a system administrator when providing a decision criterion in detection of a failure in the future is reduced. The system operations management apparatus | 10-06-2011 |
20110276839 | REMOTE COMMUNICATION SYSTEM AND METHOD - Disclosed is a remote communication system and method. A remote communication system includes a digital protection relay and a remote monitoring system. The digital protection relay stores and maintains fault indices for identifying a predetermined number of faults that have occurred, fault time tags corresponding to the fault indices and fault data corresponding to the fault indices. The remote monitoring system sets a fault index, a fault time tag, a fault data block size to be communicated at a time and a fault data block index for specifying a fault data block to be communicated, and requests the digital protection relay of a fault data block. | 11-10-2011 |
20110296251 | HEARTBEAT SYSTEM - A method of generating a heartbeat signal for an application comprising one or more objects that may enter a halt state is described. The method comprises: sending a status request to a defined interface on each object; and monitoring responses to the status requests to ascertain if each object is operating normally or in a halt state. The method further comprises: generating an application valid signal in the event that each object is operating normally; transmitting the application valid signal, if generated, to a monitoring component independent of the application; and generating at the monitoring component a heartbeat valid signal in response to receipt of the application valid signal. | 12-01-2011 |
20110314345 | ASSOCIATING A MONITORING MANAGER WITH AN EXECUTABLE SERVICE IN A VIRTUAL MACHINE MIGRATED BETWEEN PHYSICAL MACHINES - A virtual machine is migrated from a source physical machine to a target physical machine, where the virtual machine has an executable service and a monitoring agent for monitoring the executable service. In response to the migrating, a monitoring manager is started that issues a command to start the executable service. It is determined whether the command is for the executable service that is already running in the migrated virtual machine. In response to such determining, the started monitoring manager is associated with the already running executable service, where the monitoring manager cooperates with the monitoring agent to detect fault of the executable service. | 12-22-2011 |
20110320883 | MEMORY-HAZARD DETECTION AND AVOIDANCE INSTRUCTIONS FOR VECTOR PROCESSING - A processor that is configured to perform parallel operations in a computer system where one or more memory hazards may be present is described. An instruction fetch unit within the processor is configured to fetch instructions for detecting one or more critical memory hazards between memory addresses if memory operations are performed in parallel on multiple addresses corresponding to at least a partial vector of addresses. Note that critical memory hazards include memory hazards that lead to different results when the memory addresses are processed in parallel than when the memory addresses are processed sequentially. Furthermore, an execution unit within the processor is configured to execute the instructions for detecting the one or more critical memory hazards. | 12-29-2011 |
20120005541 | METHOD AND PROGRAM FOR MONITORING EXECUTION STATE OF PROGRAM - Item values associated with an execution state of a program executed on a computer are collected in detail while suppressing the computer load. When reducing the interval for collecting values of one item to be monitored, the interval for collecting values of items other than that item is increased. If the computer load is increased, an interval of at least one item is increased. Moreover, there is provided an upper limit for the number of items whose intervals can be reduced simultaneously. Moreover, when varying the interval of the item according to the values of the respective items, the interval variation range is varied according to the item state and the computer load. | 01-05-2012 |
20120017124 | METHOD, APPARATUS AND SOFTWARE FOR DETECTING YIELD IN A MECHANICAL STRUCTURE BY MEANS OF ACOUSTIC EMISSION DATA FROM SAID STRUCTURE - A method, apparatus and software is disclosed for using parameters of acoustic emissions emitted from an structure, such as aircraft landing gear, for detecting yield in the structure. | 01-19-2012 |
20120030522 | FAULT CAUSE EXTRACTION APPARATUS, FAULT CAUSE EXTRACTION METHOD, AND PROGRAM RECORDING MEDIUM - Performance information which is a possible generation cause of a fault is extracted accurately. | 02-02-2012 |
20120072779 | MEMORY LEAK MONITORING DEVICE AND METHOD FOR MONITORING MEMORY LEAK - The memory leak monitoring device for monitoring a memory leak occurring by an executed program reserving a memory area, the memory leak monitoring device comprising a retention period acquisition unit that acquires a retention period of each program indicating an elapsed time after a memory area used by the program is reserved, and a detection unit that detects a program in which a memory leak may occur by comparing the acquired retention period with a reference time. | 03-22-2012 |
20120079328 | INFORMATION PROCESSING APPARATUS | 03-29-2012 |
20120110388 | Watch-Dog Timer with Support for Multiple Masters - A time-out period is established for a watchdog timer. The time-out period is restarted each time a designated key value is received when each key value is received in a proper sequence. An error is indicated if set of key values is received in an incorrect sequence. A time-out is indicated if a correct sequence of key values is not received within the time-out period. | 05-03-2012 |
20120110389 | METHOD FOR OBTAINING STORAGE DEVICE STATE SIGNAL BY USING BMC - A method for obtaining a storage device state signal by using a Baseboard Management Controller (BMC) includes defining a sensor monitored by the BMC, in which the value of the sensor indicates the state of a storage device; converting the storage device state signal generated by a storage device controller into an electric signal by using a hardware coding method; and reading the electric signal and appointing the read value of the electric signal as the value of the sensor. | 05-03-2012 |
20120131389 | CROSS-LAYER SYSTEM ARCHITECTURE DESIGN - Methods and systems for cross-layer forgiveness exploitation include executing one or more applications using a processing platform that includes a first reliable processing core and at least one additional processing core having a lower reliability than the first processing core, modifying application execution according to one or more best-effort techniques to improve performance, and controlling parameters associated with the processing platform and the best-effort layer that control performance and error rate such that performance is maximized in a region of low hardware-software interference. | 05-24-2012 |
20120144246 | PERFORMANCE MONITORING FOR APPLICATIONS WITHOUT EXPLICIT INSTRUMENTATION - Systems and methods for monitoring operational performance of at least one application containing no explicit instrumentation are described. Data relating to the operational performance of the application can be obtained and provided to a telemetry server for analysis without the use of diagnostic instrumentation within the application. Generic and targeted performance data can be obtained using responsiveness components within a computing operating system. | 06-07-2012 |
20120144247 | SYSTEM, APPARATUS AND METHOD FOR PROVIDING TRAINING THROUGH INCORPORATION OF METAPHORICAL EXPRESSIONS - A system, apparatus and method for providing training through incorporation of metaphorical expressions are provided. A method includes receiving selected user preferences via a computer. The method also includes displaying a story board based on the selected user preferences, where the display shows text and images and the computer simultaneously plays vocals. Further, the method includes prompting the user to perform a task. Where the user successfully completes the task, the method includes taking the user to a next task. If the user does not successfully complete the task, the method includes repeating the story board and prompting the user to attempt the task again until the task is successfully completed. | 06-07-2012 |
20120151276 | Early Detection of Failing Computers - A computer management system may track services on multiple computers executing the same workload. Various performance counters may be retrieved from the computers and analyzed to identify those with low deviations and low mean deviations. Statistical tests may then be used to compare the values of a particular computer to the deviation of the group of computers to identify outliers, which may indicate degraded performance and imminent failure of the computer. The management system may analyze any collectable performance related parameter to identify outlying systems. | 06-14-2012 |
20120173933 | PROFILE-BASED EXECUTION MONITORING - An error monitor receives a first list of selected system events with each selected system event having an associated range. The occurrence of each selected system event is counted over a selected time period. An error indication is provided based on a comparison of each of the counts of the occurrence of each selected system event over the selected time period with the associated range. Operational profiles are used to store lists of selected system events with each selected system event having an associated range for each operational profile. | 07-05-2012 |
20120185735 | SYSTEM AND METHOD FOR DETERMINING CAUSES OF PERFORMANCE PROBLEMS WITHIN MIDDLEWARE SYSTEMS - A method of determining a root cause of a performance problem is provided. The method comprises analyzing a plurality of performance indicators/metrics in a first time period and determining that at least one performance indicators/metric is exhibiting abnormal behavior. The method further comprises analyzing the plurality of performance indicators/metrics over a second time period, the second time period is longer than the first time period, and determining trend information for each performance indicators/metric over the second time period. The method further comprises correlating the trend information for each performance indicators/metric with performance problem information stored in a knowledge base, identifying a potential cause of the abnormal behavior based on the correlation, and alerting a user of the potential cause. | 07-19-2012 |
20120192014 | OPERATIONS MANAGEMENT APPARATUS, OPERATIONS MANAGEMENT SYSTEM, DATA PROCESSING METHOD, AND OPERATIONS MANAGEMENT PROGRAM - An operations management apparatus which acquires performance information for each of a plurality of performance items from a plurality of controlled units and manages operation of the controlled units includes a correlation model generation unit which derives a correlation function between a first series of performance information that indicates time series variation about a first element and a second series of performance information that indicates time series variation about a second element, generates a correlation model between the first element and the second element based on the correlation function, and obtains the correlation model for each element pair of the performance information, and a correlation change analysis unit which analyzes a change in the correlation model based on the performance information acquired newly which has not been used for generation of the correlation model. | 07-26-2012 |
20120204067 | INTEGRATED CIRCUITS AND METHODS FOR DEBUGGING - A method for identifying a current context during execution of application program code. The method comprises the steps of retrieving static context information for the application program code, identifying at least one active section of the application program code loaded in physical memory; and identifying a current context based at least partly on the at least one identified active section and retrieved static context information. | 08-09-2012 |
20120210175 | CONDITION BASED DETECTION OF NO PROGRESS STATE OF AN APPLICATION - A method for condition based detection of a no progress state of an application are provided in the illustrative embodiments. A resource usage and an output of a set of applications including the application are monitored. The resource usage and the output are measured to determine a resource usage value and an output value at a first time. A present condition is detected under which the set of applications is executing. A determination is made whether the resource usage value is included in a sub-range of a resource usage scale and the output value is included in a sub-range of an output scale where the sub-range of the resource usage scale corresponds to the sub-range of the output scale for the present condition. The no progress state of the application is detected if the determination is negative. | 08-16-2012 |
20120246520 | MONITORING METHOD, INFORMATION PROCESSING APPARATUS, AND COMPUTER-READABLE MEDIUM STORING MONITORING PROGRAM - An information processing apparatus monitors one or more apparatuses based on information on multiple items acquired from the apparatuses. Information on an item #3 is associated with information on items #1 and #2. The information processing apparatus examines the information on the item #3. In the case where no failure is detected in the examination of the information on the item #3, the information processing apparatus omits examination of the information on the items #1 and #2. On the other hand, in the case where a failure is detected in the examination of the information on the item #3, the information processing apparatus examines the information on each of the items #1 and #2. | 09-27-2012 |
20120266030 | WATCHDOG TIMER TEST SYSTEM AND METHOD - A computer and method tests a watchdog timer of a baseboard management controller (BMC) of a motherboard. The computer obtains a count value from the watchdog timer. The computer calculates an accuracy value according to a beginning time of countdown, and a stop time of the countdown. The computer determines if the accuracy value falls within the predetermined qualification range and displays a determination on a display device of the computer. | 10-18-2012 |
20120272103 | SOFTWARE OPERABILITY SERVICE - In embodiments of a software operability service, activities of software can be monitored to collect software activity data. A software operability signature for the software can then be generated from the software activity data, and the software operability signature indicates an operability of the software. The software operability signature and associated contextual data can then be communicated to a network service that analyzes the software operability signature. In an embodiment, the network service compares the software operability signature to a baseline operability signature to determine whether the software is operating consistent or inconsistent with the baseline operability signature. | 10-25-2012 |
20120272104 | MONITORING COMPUTER IN A CONTROL DEVICE - A monitoring computer for monitoring a processor, on which processor a computing element is executed. The computing element essentially includes three program modules by which the performance of the motor vehicle is influenced. The processor includes a functional computer and a monitoring computer that is physically independent of the functional computer, wherein the monitoring computer includes two monitoring units that are independent of each other. | 10-25-2012 |
20120278663 | OPERATION MANAGEMENT APPARATUS, OPERATION MANAGEMENT METHOD, AND PROGRAM STORAGE MEDIUM - A time in which an administrator identifies a cause of a failure when the abnormality is detected in a plurality of servers is shortened. | 11-01-2012 |
20120284568 | HARDWARE OVERRIDE OF APPLICATION PROGRAMMING INTERFACE PROGRAMMED STATE - A method and system for overriding state information programmed into a processor using an application programming interface (API) avoids introducing error conditions in the processor. An override monitor unit within the processor stores the programmed state for any setting that is overridden so that the programmed state can be restored when the error condition no longer exists. The override monitor unit overrides the programmed state by forcing the setting to a legal value that does not cause an error condition. The processor is able to continue operating without notifying a device driver that an error condition has occurred since the error condition is avoided. | 11-08-2012 |
20120297255 | SYSTEM AND METHOD TO BETTER ASSURE CORRECT USE OF PRE-PROGRAMMED MEDICAL DEVICES - Systems and methods are provided for performing a medical procedure with respect to a subject. A data storage location of the system is pre-programmed with a plurality of subject data entries, each having subject-specific information associated with it. A user interface receives an identity input from a subject, which corresponds to the identity of the subject. A controller is associated with the database and the user interface, and is programmed to compare the identity input to the subject data entries. If the identity input corresponds to the subject-specific information of a subject data entry, the controller commands a treatment device to perform a medical procedure with respect to the subject. Otherwise, if the identity input does not correspond to the subject-specific information of any of the subject data entries, the controller generates an error signal which prevents the performance of the medical procedure with respect to the subject. | 11-22-2012 |
20120304020 | SHARED PERFORMANCE MONITOR IN A MULTIPROCESSOR SYSTEM - A performance monitoring unit (PMU) and method for monitoring performance of events occurring in a multiprocessor system. The multiprocessor system comprises a plurality of processor devices units, each processor device for generating signals representing occurrences of events in the processor device, and, a single shared counter resource for performance monitoring. The performance monitor unit is shared by all processor cores in the multiprocessor system. The PMU is further programmed to monitor event signals issued from non-processor devices. | 11-29-2012 |
20130031422 | DETECTING DEVICE IMPAIRMENT THROUGH STATISTICAL MONITORING - A tool for detecting potential impairment in an electronic device. The tool classifies the user input into various categories and determines some measurement, typically a rate of input per user or per time, for determining average use statistics of the electronic device. The tool then determines if a calculated measurement based on user inputs deviates from the average use statistics past some threshold level of deviation. In response to surpassing the threshold level of deviation, the tool identifies the electronic device as potentially impaired. | 01-31-2013 |
20130047039 | SYSTEM AND METHOD FOR COMPUTER ANALYSIS - Disclosed is a system and method for monitoring processes. The method includes the steps of monitoring at least one process in real time, collecting information on the at least one monitored process, analyzing the collected information in real time using at least one dynamic, updatable filter, identifying at least one triggering item or event matching at least one predetermined filter criterion, providing information regarding the at least one triggering item to an event processing engine for examination, and taking at least one action in real time in response to the identified triggering item or event. In certain embodiments, the method is implemented with a computer program product having a non-transitory computer readable medium having stored thereon computer executable instructions that when executed causes the computer to perform the method. | 02-21-2013 |
20130055034 | METHOD AND APPARATUS FOR DETECTING A SUSPECT MEMORY LEAK - A method for determining a suspect memory leak, including: sampling the throughput and memory usage of an application server; based on the sampled throughput, monitoring whether the throughput decrease continually, and based on the sampled memory usage, monitoring whether the memory usage remains stable within a predefined range; in response to a continual decrease of the throughput and the memory usage remaining stable within the predetermined range, determining that the application server is suspected of having a memory leak. Using the solution of the present invention can free an administrator of the burden of artificially identifying suspect servers, can identify a suspect server during runtime and further determine whether it actually has a memory leak. | 02-28-2013 |
20130061097 | SYSTEM FOR MONITORING AN OPERATION OF A DEVICE - A system monitors an application. The system includes a state table with state table nodes corresponding to application checkpoints. The state table nodes include an authorized time interval and application path. The system also includes a time counter that tracks an operation time between successive application checkpoints, and a program counter that tracks and stores an operation path for the application. A checkpoint module verifies an operation of the application at a checkpoint by comparing the authorized time interval for the checkpoint state table node and the operation time tracked by the time counter, as well as the authorized application path for the checkpoint state table node and the operation path tracked by the program counter. A security action is performed when the tracked operation time is not within the authorized time interval, or when the tracked operation path does not match the authorized application path. | 03-07-2013 |
20130061098 | FAILURE CHECK APPARATUS AND FAILURE CHECK METHOD - The present invention is related to a failure check apparatus for performing a failure check of plural CPUs, wherein the failure check apparatus is configured to predict or detect a process load of the CPUs as a whole based on vehicle information related to processes of the CPUs, and change a way of performing a failure check according to a prediction or detection result of the process load. The CPUs may be CPUs in a multi-core processor. The failure check apparatus may perform the failure check if it is predicted or detected that the process load of the CPUs as a whole is lower than a predetermined reference. | 03-07-2013 |
20130067286 | CACHING SYSTEM WITH REMOVABLE MEMORY CARD - Systems, methods, and other embodiments associated with optimizing the use of replaceable memory cards and onboard memory as storage for data in cache are described. According to one embodiment, an apparatus includes a cache space manager configured to cause a cache processor to store data of a removable memory card of a memory device to an onboard memory of the memory device. The apparatus also includes an error rate monitor configured to monitor operating parameters of the removable memory card and to activate a cache processor to store the data from the removable memory card to the onboard memory when the operating parameters meet predetermined criteria. | 03-14-2013 |
20130067287 | ELECTRONIC CONTROL DEVICE - An electronic control device includes: a processing unit that performs a predetermined process in accordance with a program; a watchdog timer that includes a time counter reset by a pulse signal output at a given period from the processing unit and outputs a signal having levels inverted depending on whether an overflow occurs; and a latch circuit that latches the signal output from the watchdog timer and outputs a signal obtained through the latching as a first output enable signal. The processing unit stops the output of the pulse signal, when diagnosing a malfunction of the watchdog timer, and diagnoses the malfunction of the watchdog timer based on the first output enable signal output from the latch circuit, after stopping the output of the pulse signal. | 03-14-2013 |
20130073911 | SYSTEM HEALTH MONITORING - An apparatus for health monitoring includes a settings module, a field data module, a settings update module, and a monitoring module. The settings module is configured to store health monitoring settings for a plurality of monitored subsystems. The field data module is configured to receive field data, the field data comprising failure data of one or more systems of the same type as at least one of the monitored subsystems. The settings update module is configured to update the health monitoring settings stored by the settings module, wherein the health monitoring settings are updated based at least in part on the field data. The monitoring module is configured to perform one or more health monitoring tasks according to the health monitoring settings. | 03-21-2013 |
20130073912 | INFORMATION PROCESSING DEVICE, SERVICE MANAGEMENT METHOD, AND SERVICE MANAGEMENT PROGRAM - When a problem occurs in a service being provided, the degree of influence of the problem is evaluated comprehensively. | 03-21-2013 |
20130080840 | MULTIPLEX SYSTEM - A multiplex system includes physical machines, and data communication cards respectively installed in the physical machines. If one of the physical machines equipped with an own data communication card is a physical machine of an own system and another one of the physical machines is a physical machine of another system, the data communication cards connect the physical machine of the own system and the physical machine of the other system communicably with each other over a communication network. Further, the data communication cards autonomously monitor the states of the physical machine of the own system and the physical machine of the other system and detect an abnormal state. | 03-28-2013 |
20130086431 | MULTIPLE MODELING PARADIGM FOR PREDICTIVE ANALYTICS - Techniques are described for monitoring a performance metric. A multiple modeling approach is used to improve predictive analysis by avoiding the issuance of warnings during spikes which occur as a part of normal system processing. This approach increases the accuracy of predictive analytics on a monitored computing system, does not require creating rules defining periodic processing cycles, reduces the amount of data required to perform predictive modeling, and reduces the amount of CPU required to perform predictive modeling. | 04-04-2013 |
20130091391 | USER-COORDINATED RESOURCE RECOVERY - A computing system includes a processor configured to identify a resource manager associated with a computing transaction, classify the computing transaction to determine a predetermined metric, measure an actual metric of the computing transaction, compare the predetermined metric to the actual metric to detect abnormal behavior in the transaction and model the abnormal behavior to determine how the resource manager is affected by the abnormal behavior. | 04-11-2013 |
20130097463 | METHOD AND APPARATUS FOR ROOT CAUSE AND CRITICAL PATTERN PREDICTION USING VIRTUAL DIRECTED GRAPHS - An approach to root cause determination in a complex systems based on monitoring and event data is disclosed. It includes a historical analysis of events with their probabilistic correlations. Applying information measures between the random variables which embody those events one can detect origins of problems and generate real-time recommendations for their locations in a hierarchical system. Estimation of system bottlenecks, as well as the risk of “black swan”-type events are also computed. The processes are based on a statistical processing of a virtual directed graph produced from historical events. | 04-18-2013 |
20130097464 | SOFTWARE APPLICATION PLACEMENT BASED ON FAILURE CORRELATION - Embodiments associate software applications with computing resources based on failure correlation information and an anti-affinity rule. An anti-affinity rule indicates that a first software application is to be separated from a second software application during execution. A management device determines failure correlations between a first computing resource that is associated with the first software application and a plurality of computing resources other than the first computing resource. The management device selects the computing resource that corresponds to the lowest failure correlation and associates the second software application with the selected computing resource based on the anti-affinity rule. | 04-18-2013 |
20130103988 | SEMICONDUCTOR DEVICE - The disclosed invention provides a semiconductor device that enables early discovery of a sign of aged deterioration that occurs locally. An LSI has a plurality of modules and a delay monitor cluster including a plurality of delay monitors. Each delay monitor includes a ring oscillator having a plurality of gate elements. Each delay monitor measures a delay time of the gate elements. A CPU # | 04-25-2013 |
20130145219 | PROGRAM FLOW CONTROL MONITORING ROUTINES, RELATED METHODS AND SYSTEMS - The present disclosure relates to program flow control monitoring routines. In one embodiment, a process control apparatus is provided with a plurality of modules associated with control and/or monitoring of a given plant. Program flow control monitoring routines are provided to monitor the various modules. | 06-06-2013 |
20130145220 | Detection on Resource Leakage - A method for detecting a resource leakage in a computing system is disclosed. The method comprises steps of: obtaining (S | 06-06-2013 |
20130151907 | OPERATIONS MANAGEMENT APPARATUS, OPERATIONS MANAGEMENT METHOD AND PROGRAM - A correlation mode is updated quickly in the case that monitored metrics arc changed. | 06-13-2013 |
20130159784 | SYSTEMS AND METHODS FOR RECORDING USER INTERACTIONS WITHIN A TARGET APPLICATION - A method includes executing instructions recorded on a non-transitory computer-readable storage media using at least one processor. The method includes receiving a notification of a selection of an user interface (UI) element within a UI of a target application, generating a request for an element listener instance, notifying multiple test recorder hooks of the request for the element listener instance, where each of the test recorder hooks is associated with a specific UI format having multiple different element listeners depending on a type of selected UI element, creating the element listener instance by one of the test recorder hooks based on the UI format and the selected UI element, registering, by the element listener instance, for events associated with the UI element and recording the events. | 06-20-2013 |
20130166960 | Byte By Byte Received Data Integrity Check - A method and an apparatus for testing a network. A source port unit may generate a packet including a payload, the payload comprising a content identifier and content data in accordance with the content identifier, and transmit the packet via the network. A destination port unit may receive the packet and extract the content identifier and received content data from the received packet. The destination port unit may obtain expected content data in accordance with the extracted content identifier and compare the expected content data and the received content data. | 06-27-2013 |
20130198575 | SYSTEM ERROR RESPONSE - An example system includes a bus, a logic device, a controller, and a non-volatile memory. The bus is configured to propagate data including at least system console output data. The logic device is configured to monitor the data on the bus and to store the system console output data in a buffer. The controller is configured to detect a system error, and, in response to the system error, to acquire at least a portion of the system console output data from the buffer. The non-volatile memory is configured to store the portion of the system console output data acquired by the controller. | 08-01-2013 |
20130212440 | SYSTEM AND METHOD FOR VIRTUAL SYSTEM MANAGEMENT - A system and method for virtual system management. A set of data received from a plurality of data sensors may be analyzed, each sensor monitoring performance at a different system component. Sub-optimal performance may be identified associated with at least one component based on data analyzed for that component's sensor. A cause of the sub-optimal performance may be determined using predefined relationships between different value combinations including scores for the set of received data and a plurality of causes. An indication of the determined cause may be sent, for example, to a management unit. A solution to improve the sub-optimal performance may be determined using predefined relationships between the plurality of causes of problems and a plurality of solutions to correct the problems. | 08-15-2013 |
20130227352 | LOG MONITORING - A log monitoring system uses log monitoring rules to monitor log data generated by applications executing on a client computing device. By monitoring log data, the system detects that one or more triggering events have occurred on the client computing device. In response, the log monitoring system can perform one or more appropriate remedial actions. Additionally, in response to the detected event(s), the log monitoring system can extract a select subset of relevant data from the client and transmit the subset of data to a separate repository for storage and/or processing. | 08-29-2013 |
20130227353 | APPLICATION MONITORING - Methods and systems for monitoring of software applications are described herein. In one implementation, monitoring data corresponding to at least one component of the application is obtained based on user preferences. The monitoring data comprises data pertaining to the software application at least one of an application level and a database level. The monitoring data is transferred to a monitoring buffer after the completion of first predetermined time interval. The monitoring data is further transferred from the monitoring buffer to a database after a second predetermined time interval. The transfer process is asynchronous of the application execution process. | 08-29-2013 |
20130246858 | METHODS AND APPARATUS FOR MONITORING OPERATION OF A SYSTEM ASSET - A device for use in monitoring operation of a plurality of system assets includes a storage device configured to store a model of a plurality of system assets and a processor coupled to the storage device. The processor is configured to receive data representative of a status of the system assets, and display, in a first display state, a plurality of asset images representative of the system assets using the model. The processor is also configured to display, in a second display state, a first asset image of the asset images within the display upon a determination that the system asset represented by first asset image is in an alarm state, and display, in a third display state, the remaining asset images within the display upon a determination that the system assets represented by the remaining asset images are not in an alarm state. | 09-19-2013 |
20130246859 | INTEGRATED CIRCUIT AND METHOD FOR MONITORING BUS STATUS IN INTEGRATED CIRCUIT - Embodiments of the present invention disclose an integrated circuit and a method for monitoring a bus status in the integrated circuit. Multiple status detectors and a top layer monitor are disposed in the integrated circuit. Each status detector in the multiple status detectors is used to read status data on a branch bus that is coupled to each status detector in the multiple status detectors, and then the top layer monitor collects the status data from each status detector, and outputs the status data through an interface. | 09-19-2013 |
20130246860 | SYSTEM MONITORING - A method of monitoring a system is disclosed, in particular to identify the cause of conditions outside expected operating conditions. The output of one or more sensors associated with a system is monitored and data from the one or more sensors is arranged as a plurality of modes with each mode being defined by a different condition in which the system may operate. Faulty conditions are identified by monitored data being outside one of the plurality of modes. The use of a plurality of modes enables operation of the system to be defined and tracked more precisely and false alarms may be reduced. At least one of the modes may be established to indicate a particular failure of the system. This failure mode may have a likely cause of the failure associated with it such that diagnosis and repair may be facilitated quickly and easily. | 09-19-2013 |
20130275812 | DETERMINING ROOT CAUSE - Methods, systems, and computer-readable media with executable instructions stored thereon for determining root cause are provided. A method for determining root cause can include receiving values for at least one performance metric for each of a plurality of components of an IT system to establish a normal value for each of the performance metrics, receiving an abnormal value that differs from the normal value for at least one of the plurality of components of the IT system, and determining a probability that the at least one of the plurality of components of the IT system is a root cause of the abnormal value. | 10-17-2013 |
20130275813 | METHOD AND SYSTEM FOR USE IN CONDITION MONITORING - A condition monitoring system including at least one computing device also includes a memory device configured to store data associated with a monitored device and at least one input channel that is configured to receive the data associated with the monitored device. The condition monitoring system further includes a processor coupled to the memory device and the at least one input channel. The processor is programmed to determine a potential fault condition by comparing at least a portion of the data associated with the monitored device with at least one scenario programmed therein. The at least one scenario is at least partially based on at least one predetermined event associated with at least one condition of the monitored device. | 10-17-2013 |
20130290791 | Mapping a Network Fault - A method of mapping a network fault is provided. Information is received concerning geographical coordinates of terminal network elements and their association with shared network components. A performance parameter is transmitted via upstream network communications from the terminal network elements is monitored. Terminal network elements from which the monitored performance parameter are unacceptable relative to a predetermined threshold for the performance parameter are identified, and a cluster of terminal network elements estimated to be subject to a common network fault is defined. The cluster includes terminal network elements that are identified as reporting an unacceptable performance parameter, as being within a predetermined geographic distance from each other, and as being associated with a common shared network component. A geographic map is populated with a single cluster alarm and includes an identification of the terminal network elements within the cluster. An electronic device and non-transitory computer readable storage medium are provided. | 10-31-2013 |
20130305100 | System and method for predicting and avoiding network downtime - This invention teaches how to use prediction software and algorithms to minimize the risk of failure, and to increase the likelihood of success of information technology (IT) and telecommunications system changes. The method identifies the systems, people, documents and other unanticipated consequences of system changes. The invention teaches how use of the prediction software and algorithms allow system administrators to find more advantageous ways and times to perform system changes. | 11-14-2013 |
20130311834 | PREVENTING CASCADE FAILURES IN COMPUTER SYSTEMS - A computer hardware-implemented method, system, and/or computer program product prevents a cascading failure in a complex stream computer system causing an untrustworthy output from the complex stream computer system. Multiple upstream subcomponents in a complex stream computer system generate multiple outputs, which are used as inputs to a downstream subcomponent. An accuracy value is assigned to each of the multiple outputs from the upstream subcomponents, and weighting values are assigned to each of the inputs to the downstream subcomponent. The accuracy values and weighting values are utilized to dynamically adjust inputs to the downstream subcomponent until an output from the downstream subcomponent meets a predefined trustworthiness level. | 11-21-2013 |
20130332778 | PERFORMANCE-IMBALANCE-MONITORING PROCESSOR FEATURES - The current application is directed to architected hardware support within computer processors for detecting and monitoring various types of potential performance imbalances with respect to simultaneously executing hardware threads in simultaneous multi-threading (“SMT”) processors and SMT-processor cores. The architected hardware support may include various types of performance-imbalance-monitoring registers that accumulate indications of performance imbalances and that can be used, by performance-monitoring software and by human analysts to detect performance-degrading conflicts between simultaneously executing hardware threads. Such conflicts can be ameliorated by changing the scheduling of virtual machines, tasks, and other computational entities, by redesigning and re-implementing all or portions of performance-limited and performance-degrading applications, by altering resource-allocation strategies, and by other means. In addition, performance imbalance detection and monitoring can be used to provide accurate, computational-throughput-based accounting in cloud-computing environments. | 12-12-2013 |
20130332779 | METHOD FOR AUTOMATICALLY MONITORING AT LEAST ONE COMPONENT OF A PHYSICAL SYSTEM - A method for automatic monitoring of at least one component of a physical system, includes checking data of a data record for errors caused by a preceding data processing, checking the data in the physical context of the at least one sensor for errors resulting from infringements of the assumptions of physical and/or system-related factors in elements of the measurement chain, the context of the component for errors resulting from infringements of the physical and/or system-related factors of the component, and—checking the individually asserted errors against one another and then either rejecting the error or outputting the error as an error message with reference to the error source. | 12-12-2013 |
20140019811 | COMPUTER SYSTEM PERFORMANCE MARKERS - Identifying computer system markers to understand computer system performance, in one aspect, may comprise identifying a set of executions of applications indicative of computer performance based on first values associated with a first set of artifacts in the set of executions. Two subsets of executions from said identified set of executions are selected based on second values associated with a second set of artifacts in the set of executions. One or more markers are identified by determining one or more third set of artifacts from the two subsets of executions that have an associated third value that is different in a first of the two subsets from a second of the two subsets of executions according to a criterion. | 01-16-2014 |
20140019812 | SYSTEM AND METHOD FOR MAINTAINING DATA INTEGRITY ON A STORAGE MEDIUM - A method of storing data on a storage medium includes determining a risk index associated with a performance of the storage medium, adjusting a refresh factor associated with at least a portion of the storage medium in response to determining the risk index, and performing a data refresh operation on the portion of the storage medium based at least in part on the on the refresh factor. | 01-16-2014 |
20140026000 | HIGHLY AVAILABLE SERVER SYSTEM BASED ON CLOUD COMPUTING - A highly available server system based on cloud computing comprises a central control management server, a cloud host server, a storage server and at least one application server; the central control management server is connected with at least one application server, and configured to respectively monitor at least one application server, if detecting that there exists an application server in the fault state among the at least one applications server, then the central control management server sends a first instruction message; the cloud host server is connected with the central control management server, and configured to receive the first instruction message, and call the target virtual machine image file from the storage server according to instructions of the first instruction message, and run the target virtual machine image file; the storage server is configured to store the corresponding virtual machine image file of at least one application server. | 01-23-2014 |
20140026001 | Method of Improving Data Transmission and Related Computer System - A method of improving a data transmission for a firmware in a computer system is disclosed. The method includes monitoring a time-out count, a roll-over count, and an error flag of the data transmission when the data transmission is performed via a high-speed bus; and determining whether to send an interrupt command to a BIOS according to the time-out count, the roll-over count, and the error flag. | 01-23-2014 |
20140032975 | DYNAMIC HARDWARE WATCHPOINT - A method and apparatus for monitoring changes to a block of data is disclosed. A computer sets a first hardware watchpoint to monitor changes to the block of data at a current location of the block of data in memory and a second hardware watchpoint to monitor changes at a selected location in the memory where a reference to the block of data is located. Responsive to the second hardware watchpoint being triggered by a change at the selected location where the reference to the block of data is located, the computer identifies a new location of the block of data in the memory based on the change that triggered the second hardware watchpoint. Subsequent to identifying the new location of the block of data, the computer then resets the first hardware watchpoint to monitor changes to the block of data at the new location of the block of data. | 01-30-2014 |
20140032976 | APPARATUS AND METHOD FOR DETECTING ERROR - An apparatus and method for detecting an error occurring when an application program is executed in a computer environment is provided. The error detection apparatus may measure a deterministic progress index (DPI) and a program counter (PC) value when an instruction is executed, set, as a verification set, a DPI and a PC value measured when the instruction is executed without causing an error, set, as a measurement set, the DPI and the PC value measured when an instruction is executed, and detect a runtime error of the instruction by comparing the measurement set to the verification set. | 01-30-2014 |
20140047281 | MEMORY SYSTEM AND MEMORY CONTROLLER - According to one embodiment, a memory system includes a NAND-type flash memory and a memory controller. The memory controller includes a monitoring module and a determination module. The monitoring module acquires an elapsed time from the start of data erase of a first block in the NAND-type flash memory. The determination module determines whether the elapsed time has exceeded a reference time before completion of the data write in the first block. | 02-13-2014 |
20140059392 | PROTECTING VIRTUAL MACHINES AGAINST STORAGE CONNECTIVITY FAILURES - A system for monitoring a virtual machine executed on a host. The system includes a processor that receives an indication that a failure caused a storage device to be inaccessible to the virtual machine, the inaccessible storage device impacting an ability of the virtual machine to provide service, and applies a remedy to restore access to the storage device based on a type of the failure. | 02-27-2014 |
20140082428 | Dynamic Hardware Watchpoint - An apparatus for monitoring changes to a block of data is disclosed. A first hardware watchpoint is set to monitor changes to the block of data at a current location of the block of data in memory and a second hardware watchpoint is set to monitor changes at a selected location in the memory where a reference to the block of data is located. Responsive to the second hardware watchpoint being triggered by a change at the selected location where the reference to the block of data is located, a new location of the block of data in the memory is identified based on the change that triggered the second hardware watchpoint. Subsequent to identifying the new location of the block of data, the first hardware watchpoint is reset to monitor changes to the block of data at the new location of the block of data. | 03-20-2014 |
20140101492 | ADAPTIVE PREVENTIVE MAINTENANCE FOR COMPUTING SYSTEMS - Systems, methods, and other embodiments associated with adaptively determining a preventive maintenance schedule based on historical system operation are described. The prognostic parameter values are continuously partitioned into a number of operating states based on observed maintenance costs associated with the prognostic parameter values. The operating states range from absolutely healthy, one or more degrees of degradation, to fully degraded. A system cost function is used as the discriminant function. The system cost function is an expected maintenance cost when a given preventive maintenance (PM) schedule is adopted. The system cost function calculates the expected cost based on the observed cost of operation in each of the operating states and a probability of the computing system being in each of the operating states as determined by the PM schedule. The PM schedule that minimizes the cost function is determined to be the optimal PM schedule. | 04-10-2014 |
20140115405 | INTEGRITY CHECKING INCLUDING SIDE CHANNEL MONITORING - A method for integrity checking for a cryptographic engine in a computing system includes monitoring a state of a side channel of the cryptographic engine during operation of the cryptographic engine by a side channel monitor; comparing the state of the side channel to a side channel model of the cryptographic engine to determine whether a mismatch exists between the state of the side channel and the side channel model; and based on a mismatch between the state of the side channel and the model of the side channel, indicating an error in the cryptographic engine. | 04-24-2014 |
20140115406 | DELAY-TOLERANT AND LOSS-TOLERANT DATA TRANSFER FOR MOBILE APPLICATIONS - A method supports data communication in a mobile application by specifying in the mobile application a program intent and one or more course or fine-grained properties of data objects in terms of tolerance to delay and loss; selecting a transfer policy for a set of data objects based on the application intent; receiving and coalescing intents of one or more applications for object data for the one or more applications; crafting an aggregate transfer policy, and communicating data from one or more applications as an aggregate based on the aggregate transfer policy to programmatically incorporate and benefit from tolerance to delay in the transfer of data. | 04-24-2014 |
20140143609 | REMOTELY CONTROLLED DATA LOGGING - A method and system to remotely control data logging are described including establishing a first connection, transmitting a signal to initiate data logging, terminating the established first connection, initializing a timer, determining if the timer has expired, establishing a second connection, transmitting a signal to cease data logging, transmitting a signal to collect the logged data and receiving the logged data. | 05-22-2014 |
20140149802 | Apparatus And Method To Obtain Information Regarding Suppressed Faults - A processor includes an execution unit, a fault mask coupled to the execution unit, and a suppress mask coupled to the execution unit. The fault mask is to store a first plurality of bit values to indicate which elements of a multi-element vector have an associated fault generated in response to execution of an instruction on the element in the execution unit. The suppress mask is to store a second plurality of bit values to indicate which of the elements are to have an associated fault suppressed. The processor also includes counter logic to increment a counter in response to an indication of a first fault associated with the first element and received from the fault mask, and an indication of a first suppression associated with the first element and received from the suppress mask. Other embodiments are described as claimed. | 05-29-2014 |
20140149803 | METHOD AND SYSTEM FOR TRACING INDIVIDUAL TRANSACTIONS OVER MESSAGING SYSTEMS WITHOUT ADDING TRACING INFORMATION TO MESSAGES - A performance monitoring system is presented for monitoring and tracing individual transactions, where transaction processing includes sending and receiving messages using messaging systems that do not allow the augmentation of existing messages with monitoring system specific correlation information. Agents are deployed to sender and receiver applications that monitor and report transactions. Both sender and receiver applications are instrumented with sensors that detect and report sending or receiving of such immutable messages. Those sensors also extract correlation data from sent and received data allowing the identification of matching corresponding send/receive pairs. A mapping agent is used to retrieve mapping information from a messaging system which may alter the additional message identification data while messages travel through the system. This mapping information is additionally used for the correlation process. | 05-29-2014 |
20140157061 | Evaluating Service Degradation Risk for a Service Provided by Data Processing Resources - In one aspect, a service requirements specification specifies data processing resources required to provide a service, and a configuration specification specifies a configuration of data processing resources for providing the service. The service requirements specification and configuration specification are analyzed using resource reliability data for the specified resources to determine a composite risk of degradation of the service. In another aspect, reliability of one or more software modules is projected according to a current state in a development life cycle of the software modules and any of various additional indicators. Preferably, a data processing support provider separate from the service-providing enterprise maintains historical field support data concerning significant field defect events with respect to various resources, and uses this data for projecting reliability of the resources. | 06-05-2014 |
20140157062 | Evaluating Service Degradation Risk for a Service Provided by Data Processing Resources - In one aspect, a service requirements specification specifies data processing resources required to provide a service, and a configuration specification specifies a configuration of data processing resources for providing the service. The service requirements specification and configuration specification are analyzed using resource reliability data for the specified resources to determine a composite risk of degradation of the service. In another aspect, reliability of one or more software modules is projected according to a current state in a development life cycle of the software modules and any of various additional indicators. Preferably, a data processing support provider separate from the service-providing enterprise maintains historical field support data concerning significant field defect events with respect to various resources, and uses this data for projecting reliability of the resources. | 06-05-2014 |
20140173359 | Automated Correlation and Analysis of Callstack and Context Data - Embodiments allow a user to define event scenarios that are used to analyze callstack and context data. Scenarios that are delayed are flagged and reported to the user with an aggregated callstack of CPU samples taken during the delay. An aggregation is done for samples for the main user interface thread of the process that is being monitored. A user may select other threads to see the callstack aggregation for that thread. The user can identify which methods use the most time for a particular delay from the callstack presentation. An event analysis tool allows quick exploration of the responsiveness issues by visualizing delays as they happen and allowing the user to drill down into callstack details for selected delays. | 06-19-2014 |
20140173360 | APPARATUS AND METHOD FOR CONTROLLING DATA INTERFACE - Disclosed is an apparatus and a method for controlling data interface. The apparatus for controlling data interface comprises: a transmitting terminal outputting signal including a CDR (Clock Data Recovery) training signal, an align training signal and display data sequentially; a receiving terminal inputting the signals from the transmitting terminal; and a Rx monitoring device detecting an abnormal status of the receiving terminal by monitoring an input timing signal and an operating status of the receiving terminal, and resetting the receiving terminal when the receiving terminal operates abnormally. | 06-19-2014 |
20140189438 | MEMORY LEAK DETECTION - In accordance with aspects of the disclosure, systems and methods are provided for monitoring one or more classes for detecting suspected memory leaks in a production environment. The systems and methods may include identifying which of the one or more classes hold at least one static or non-static field of collection or array type, accessing the one or more classes that hold the at least one static or non-static fields of collection or array type, and tracking a size for each field of each class by periodically sampling the size of each field over an interval, processing the size data for each field of each class, and detecting suspected memory leaks of each class by identifying which of the one or more fields of each class exhibits suspect behavior in the size over the interval. | 07-03-2014 |
20140195860 | Early Detection Of Failing Computers - A computer management system may track services on multiple computers executing the same workload. Various performance counters may be retrieved from the computers and analyzed to identify those with low deviations and low mean deviations. Statistical tests may then be used to compare the values of a particular computer to the deviation of the group of computers to identify outliers, which may indicate degraded performance and imminent failure of the computer. The management system may analyze any collectable performance related parameter to identify outlying systems. | 07-10-2014 |
20140223240 | SELECTIVE MONITORING OF ARCHIVE AND BACKUP STORAGE - Systems and methods for providing information security in a network environment. The method includes receiving a user selection of a data section recorded on a storage system. The method further includes determining a monitoring routine for the data section. The method further includes determining a physical location at which the data section is recorded in the storage system. The method further includes monitoring the physical location for faults according to the monitoring routine. | 08-07-2014 |
20140237301 | PRESET EVALUATION TO IMPROVE INPUT/OUTPUT PERFORMANCE IN HIGH-SPEED SERIAL INTERCONNECTS - Methods and apparatus for utilization of preset evaluation to improve input/output performance in high-speed serial interconnects are described. In some embodiments, performance of a link is evaluated at a plurality of equalization values and one of the plurality of equalization values is selected for the link based on comparison of a plurality of margin values that are to be determined for each of the plurality of equalization values. Other embodiments are also claimed and/or disclosed. | 08-21-2014 |
20140237302 | CHARACTERIZATION AND FUNCTIONAL TEST IN A PROCESSOR OR SYSTEM UTILIZING CRITICAL PATH MONITOR TO DYNAMICALLY MANAGE OPERATIONAL TIMING MARGIN - Guardband validation for a device having a critical path monitor involves first applying multiple calibration settings to the monitor during functional operation of the processor, and recording corresponding guardbands which result in reduced timing margin. A desired guardband can later be selected for validation. The calibration settings can be based on delays for a critical path. A calibration test procedure can be used to determine the calibration delays for different operating frequencies or voltages that are set or, alternatively, the calibration delays can be set and resultant frequencies measured which are used to calculate the guardband amounts. The critical path monitor may include a modified calibration delay circuit which provides a calibrated delay signal to a critical path synthesis circuit, and the multiple calibration settings can be applied by changing delay taps of the calibration delay circuit in response to a bias delay signal from a power management controller. | 08-21-2014 |
20140245076 | SYSTEM AND METHOD FOR PRESERVING CRITICAL DEBUG DATA IN A PORTABLE COMPUTING DEVICE - One or more triggers may be coupled to sources on a system on a chip of a portable computing device. The sources monitor the system for status conditions. The one or more triggers are coupled to a trigger bus. A sequencer engine is coupled to the trigger bus and a communication bus. The sequencer engine receives one or more instructions from the communication bus for determining how the sequencer engine should monitor the one or more triggers via the trigger bus and preserve data received from the one or more triggers before a system reset. The sequencer engine then receives data from the one or more triggers and stores the data in local memory storage. The sequencer engine, if programmed, may generate at least one of a trace packet, an interrupt signal, and a general purpose input/output signal in response to receiving data from one or more triggers. | 08-28-2014 |
20140281738 | METHOD AND SYSTEM FOR KEY PERFORMANCE INDICATORS ELICITATION WITH INCREMENTAL DATA DECYCLING FOR DATABASE MANAGEMENT SYSTEM - A method for processing signals from a data server system including generating, by a monitoring module on a monitoring facility, a plurality of frequency data items, where the monitoring facility comprises a central processing unit, obtaining, by the monitoring module, a first signal value from the data server system, where the signal value is a measurement of an element of the data server system, and calculating a plurality of fit errors for the plurality of frequency data items using the first signal value. The method further includes selecting a frequency data item of the plurality of frequency data items with a lowest fit error to obtain a selected frequency data item, removing a cyclic component of the first signal value using the selected frequency data item to obtain a first processed signal value, and displaying the first processed signal value on a graph. | 09-18-2014 |
20140310564 | Autonomous Service Management - Novel tools and techniques that offer more robust solutions for application service management. Some such solutions provide a service management framework for managing a software application. In some cases, the framework can include multiple tools to detect and/or remedy application problems at a variety of different levels. In another aspect, some solutions can define multiple application lifecycle phases, ranging from minor impairment to catastrophic failure. For each of such phases, the service management framework can define one or more diagnostic criteria and/or one or more corrective actions that can be taken to remedy a suboptimal condition of the application. | 10-16-2014 |
20140325287 | SYSTEM MONITOR FOR MONITORING FUNCTIONAL MODULES OF A SYSTEM - A method includes detecting a counter event at a system monitor of a system. The method also includes, in response to detecting the counter event, checking a state of each flag of a first set of flags. Each of the first set of flags is associated with a monitored module of the system, and the state of each of the first set of flags is indicated by a value at a memory location that is enabled. The method also includes, in response to determining that at least one flag of the first set of flags has a value indicating an error associated with a particular monitored module, causing an action to be performed at the system. | 10-30-2014 |
20140344628 | CERTIFICATION OF NON-NATIVE DATA LAYOUT IN A MANAGED RUNTIME SYSTEM - One embodiment of the present invention discloses a method, computer program product, and system for conditioning a memory region. An exemplary embodiment determines an anticipated form of an object. An exemplary embodiment determines a memory region for the object. An exemplary embodiment encodes the anticipated form of the object. An exemplary embodiment inserts the encoding of the anticipated form of the object into the memory region for the object. An exemplary embodiment acquires the object. An exemplary embodiment determines a form of the object. An exemplary embodiment compares the form of the object with the anticipated form of the object. An exemplary embodiment indicates an error if the form of the object differs from the anticipated form of the object. | 11-20-2014 |
20140351657 | Method and Apparatus for a Predictable Cloud Infrastructure Assurance Model - Method and Apparatus for rapid scalable unified infrastructure system management platform are disclosed by discovery of compute nodes, network components across data centers, both public and private for a user; assessment of type, capability, VLAN, security, virtualization configuration of the discovered unified infrastructure nodes and components; configuration of nodes and components covering add, delete, modify, scale; and rapid roll out of nodes and components across data centers both public and private. | 11-27-2014 |
20140372810 | APPARATUS AND METHOD FOR MONITORING PERFORMANCE OF CORES BASED ON MULTI-CORE PROCESSOR - An apparatus and method for monitoring the performance of cores based on a multi-core processor. The apparatus includes a status information collection unit and a monitoring unit. The status information collection unit collects a plurality of pieces of status information extracted from respective cores, and stores the plurality of pieces of status information in respective memory areas provided for the cores. The monitoring unit receives the status information, sends the status information to a storage unit, and performs monitoring based on the status information. The monitoring unit is provided in any one of the cores. | 12-18-2014 |
20150012782 | NON-INTRUSIVE MONITORING AND CONTROL OF INTEGRATED CIRCUITS - An application-specific integrated circuit (ASIC) is provided. The ASIC includes a group of non-configurable circuits customized for performing operations for a particular use. The ASIC also includes a set of reconfigurable circuits for configurably performing a set of operations based on configuration data. The ASIC also includes a configuration and monitoring network that receives a set of signals from the non-configurable circuits of the ASIC. The configuration and monitoring network also receives incremental sets of configuration data while the ASIC is performing operations of the user design. Each incremental set of data is used for reconfiguring the configuration and monitoring network (i) to monitor one or more signals in the set of signals and (ii) to take a set of actions when values of the monitored signals satisfy a condition. | 01-08-2015 |
20150039946 | METHOD AND SYSTEM FOR A HIGH AVAILABILITY FRAMEWORK - A method for providing a high availability framework, comprises executing a first component of the high availability framework within a shared kernel based on a first operating system, executing a second component of the high availability framework within a first userland of the first operating system, and executing a third component of the high availability framework within a second userland of a second operating system, wherein the second operating system is an older version of the first operating system. The method further comprises monitoring, by a health service of the shared kernel, the first operating system and a first application executing within the first userland; and monitoring, by the health service, the second operating system and a second application executing within the second userland. | 02-05-2015 |
20150046755 | SYSTEM AND METHODS FOR PRECISE MICROPROCESSOR EVENT COUNTING - Method for providing precise microprocessor performance counter readings including detecting a swap back to a monitored process executing in a microprocessor. In response to the detected swap back to the monitored process, if the value read from the performance counter does not exceed the defined overflow threshold, the value of the performance counter stored in the first memory location is restored to the performance counter. If the value read from the performance counter exceeds the defined overflow threshold, the performance counter is set to zero and the value of the performance counter stored in the first memory location is used to increment an overflow memory location. If the value read from the performance counter exceeds the defined overflow threshold, at least one performance counter reading instruction is detected and in response to the detected at least one performance counter reading instruction, setting the counter output register to zero. | 02-12-2015 |
20150067408 | EVENT COMMUNICATION APPARATUS FOR PROTECTION RELAY - Disclosed is an event communication apparatus for a protection relay, which effectively simplifies an event determination operation by a main processing module and a communication module, thereby enhancing updating. The event communication apparatus for the protection relay includes a shared memory configured to store and provide data needed to share, a main processing module configured to, whenever an event occurs, update previous event data to a status information of the event and a status occurrence time information as new event data, and write the updated event data into the shared memory, and a communication module configured to periodically read status information from the shared memory, compare the read status information with pre-stored previous status information to determine whether there is a status change, determine occurrence of a new event when there is the status change, and transmit corresponding event data to an supervisory monitor immediately when the new event occurs. | 03-05-2015 |
20150074467 | Method and System for Predicting Storage Device Failures - The invention pertains to a method and information handling system (IHS) for predicting storage device failures. An embodiment of the method of the present invention begins by obtaining data regarding input and output of the at least one storage device. Next, the obtained data is normalized to determine a duty cycle of the at least one storage device. Finally, using the normalized data, a likelihood of failure of the at least one storage device is determined. In another example embodiment, a failure indicator is associated with the at least one storage device based upon the determined likelihood of failure. | 03-12-2015 |
20150074468 | SAN Vulnerability Assessment Tool - The invention pertains to a method and information handling system (IHS) for assessing storage device vulnerability to data unavailability or data loss. An embodiment of the method of the present invention begins by obtaining data regarding static and dynamic factors of the at least one storage device. Next, based on the obtained data, a risk score is calculated for the at least one storage device. Finally, using the obtained data, the risk score is presented to a user. In another example embodiment, a risk score indicator is associated with the at least one storage device based upon the calculated risk score. | 03-12-2015 |
20150082097 | SYSTEMS AND METHODS FOR COLLECTING, TRACKING, AND STORING SYSTEM PERFORMANCE AND EVENT DATA FOR COMPUTING DEVICES - A system is configured to track and store system and event data for various computing devices. The system is configured to associate the various computing devices with profiles based at least in part on characteristics of the computing devices. The system is further configured to compare performance data and/or performance metrics for particular computing devices having a particular profile against all other devices that share the particular profile. The system then displays this comparison to a user of the particular computing device, substantially automatically diagnoses an issue with the particular computing device based on the performance and system event data, and/or enables the user to diagnose the problem based on the performance and system event data. | 03-19-2015 |
20150082098 | FORECASTING IN COMPUTING ENVIRONMENTS - A method, system and a computer program product for forecasting in computing environments includes capturing an architectural pattern in a first computing environment, detecting a state in the captured architectural pattern, identifying an architectural pattern identical to the captured architectural pattern in one or more other computing environments and forecasting the detected state in the one or more other computing environments. | 03-19-2015 |
20150121152 | SYSTEM MONITORING AND DEBUGGING IN A MULTI-CORE PROCESSOR SYSTEM - A multi-core processor system includes a first resource, a first core, a second resource, and a second core. The first core runs a first operating system (OS), and the first resource is allocated to the first OS. The second core runs a second OS, and the second resource is exclusively allocated to the second OS. The first OS and the second OS are designed for running at the same time, and the second OS is configured for monitoring or debugging the first resource, the first core, or the first OS. | 04-30-2015 |
20150127995 | SYSTEMS AND METHODS FOR DIFFERENTIAL HEALTH CHECKING OF AN INFORMATION MANAGEMENT SYSTEM - Differential health-check systems and accompanying methods provide health-checking and reporting of one or more information management systems in reference to a first time period before and a second time period after a triggering event. A triggering event may be an upgrade of at least part of the information management system, or a restore operation completed in the information management system for example following a disaster, or any number of other events, etc. The health-checking and reporting may comprise a comparison of one or more performance metrics of one or more components and/or operations of the information management system during the first and second time periods. | 05-07-2015 |
20150143181 | DUAL ENDIANESS AND OTHER CONFIGURATION SAFETY IN LOCK STEP DUAL-CORE SYSTEM, AND OTHER CIRCUITS, PROCESSES AND SYSTEMS - An electronic circuit includes a microcontroller processor ( | 05-21-2015 |
20150293806 | Direct Connect Algorithm - A system includes a safety relevant component that generates a data packet in response to receiving a request to perform a task and that communicates the data packet. The system further includes a first fail-safe chassis (FSC) that continuously generates a first and second chassis health signals, that determines whether the data packet is valid, and that selectively determines whether to de-assert the first and second chassis health signals based on the determination. The system also includes a second FSC that continuously generates a third a fourth chassis health signals, that determines whether a data packet is valid, and that selectively determines whether to de-assert the third and fourth chassis health signals based on the determination. The system includes a direct connect algorithm state machine that determines whether to instruct the one of the first and second FSCs to operate in a predetermined mode based on the chassis health signals. | 10-15-2015 |
20150317202 | PREVENTING CASCADE FAILURES IN COMPUTER SYSTEMS - A computer hardware-implemented method, system, and/or computer program product prevents a cascading failure in a complex stream computer system causing an untrustworthy output from the complex stream computer system. Multiple upstream subcomponents in a complex stream computer system generate multiple outputs, which are used as inputs to a downstream subcomponent, wherein the multiple upstream subcomponents execute upstream computational processes. Each upstream computational process is examined to determine an accuracy of each identified output. An accuracy value is assigned to each of the multiple outputs from the upstream subcomponents, and weighting values are assigned to each of the inputs to the downstream subcomponent. If using the accuracy values and weighting values fails to adjust the downstream subcomponent to meet a predefined trustworthiness level for making a first type of prediction, then a new downstream computational process that produces a different second type of prediction is executed. | 11-05-2015 |
20150363256 | ADMISSION CONTROL BASED ON THE END-TO-END AVAILABILITY - Providing admission control for a request may comprise creating a process flow associated with the request, the process flow identifying a plurality of computer-implemented components and a flow of transactions occurring between the computer-implemented components; executing the flow of transactions on the plurality of computer-implemented components; logging the flow of transactions; monitoring the flow of transactions to detect a problem in the flow or one or more of the components, or combination thereof; responsive to not detecting a problem in the flow or one or more of the components, or combination thereof, allowing the request to proceed; and responsive to detecting a problem in the flow or one or more of the components, or combination thereof, not allowing the request to proceed. | 12-17-2015 |
20160048440 | PERFORMANCE MONITORING IN A DATA PROCESSING APPARATUS CAPABLE OF EXECUTING INSTRUCTIONS AT A PLURALITY OF PRIVILEGE LEVELS - A data processing apparatus has processing circuitry which can execute instructions at one of several privilege levels. A plurality of performance monitoring circuits are included. In response to an instruction executed at a first privilege level, first configuration data can be set for controlling performance monitoring by a first subset of performance monitoring circuits. A disable control flag can be set in response to an instruction executed at a second privilege level higher than the first privilege level. If the disable control flag has a predetermined value then performance monitoring control circuitry disables performance monitoring by the first subset of performance monitoring circuits while the processing circuitry is executing instructions at the second privilege level. | 02-18-2016 |
20160070614 | IDENTIFYING FAULT CONDITIONS IN COMBINATIONS OF COMPONENTS - A control mechanism in a system monitors inputs and outputs (such as sensor data representing one or more environmental conditions in one or more environments, sub-services in the services, and/or compensation) exchanged among components in combinations that provide the services in the environments, where the components in a given combination include at least one of: environmental monitoring devices in the environments and one or more of the partner electronic devices in the environments and/or service providers. Moreover, the control mechanism stores the monitored inputs and outputs, and analyzes the monitored inputs and outputs based on quality criteria and historical inputs and outputs exchanged within the combinations. Based on the analysis, the control mechanism identifies an instance in the inputs and the outputs of: incorrect sensor data and/or fraudulent compensation. Furthermore, the control mechanism performs a remedial action based on the identified instance. | 03-10-2016 |
20160077948 | METHOD AND SYSTEM FOR MONITORING HEALTH OF A VIRTUAL ENVIRONMENT - A method and system for monitoring health of virtual environment includes receiving input data for one or more virtual machines in the virtual environment. A number of entitled CPU cycles for each of the virtual machines based on the input data are determined. A number of actual CPU cycles obtained by each of the virtual machines based on the input data are computed. The number of entitled CPU cycles is compared with the number of actual CPU cycles for each of the virtual machines. A health status of the virtual machines based on the comparison is displayed. | 03-17-2016 |
20160092335 | LINK RETRAINING BASED ON RUNTIME PERFORMANCE CHARACTERISTICS - Systems and methods may provide for monitoring one or more runtime performance characteristics of a link and determining a state of the link based on at least one of the one or more runtime performance characteristics. Additionally, a retraining of the link may be automatically scheduled based on the state of the link. In one example, scheduling the retraining of the link further includes setting one or more retraining parameters. | 03-31-2016 |
20160098309 | BACKUP-INSTRUCTING BROADCAST TO NETWORK DEVICES RESPONSIVE TO DETECTION OF FAILURE RISK - Embodiments relate to systems and methods for detecting failure-risk events at devices and facilitating local and/or remote data back-up and/or device operations. In some instances, a device characterizes a stimulus sensed at the device or an operation of a component of the device. A determination is made that a failure-risk condition is satisfied based on the characterization. In response to determining that the failure-risk condition is satisfied, the device initiates a data backing up of data in a non-volatile reserved memory or facilitates transmission of an alert communication from the device to another device. | 04-07-2016 |
20160105531 | FACILITATING QUALITY OF SERVICE AND SECURITY VIA FUNCTIONAL CLASSIFICATION OF DEVICES IN NETWORKS - Quality of service and security are facilitated via functional classification of devices within a network. One method includes receiving, by a first device of devices of a network, notification information of a presence of a second device among the devices of the network, wherein the devices are configured to communicate information about events associated with respective operations of the devices; and generating, by the first device, first information indicative of an identity of and a functional classification of a function of the second device. The method also includes initiating, by the first device to a controller within the network, a transmission of second information for association of third information indicative of the functional classification of the function of the second device with data generated by the second device. The functional classification of the function of the second device is associated with potential impact of failure of the second device. | 04-14-2016 |
20160110279 | CHARACTERIZING DEVICE PERFORMANCE BASED ON USER-PERCEIVABLE LATENCY - A method and an apparatus for characterizing performance of a device based on user-perceivable latency. To characterize device performance, a value of a metric may be computed from latencies of operations performed by the device. In computing a value of a metric, latencies may be treated differently, such that some latencies perceivable by a user of the device may have a greater impact on the value of the metric than other latencies that either are not perceivable or are perceived by the user to a lesser degree. Such a performance metric based on user-perceivable latency facilitates identification of computing device that provide a desirable user experience. | 04-21-2016 |
20160112282 | AREA EFFICIENT TRAFFIC GENERATOR - A packet generation and inspection system for monitoring the performance of one or more flows on a packet network comprises a processor and memory coupled to each other and to a network bus. The memory stores instructions to be executed by the processor and data to be modified by the execution of the instructions. A processor-controlled arbiter is coupled with the processor and the network bus, and upon reception of a packet on the bus or prior to transmission of a packet on the bus for one of said flows, the arbiter requests execution by the processor of selected instructions stored in the memory by providing the processor with the address of the selected instructions in the memory. The memory provides the processor with data associated with the selected instructions, and the processor modifies the data upon execution of the selected instructions. | 04-21-2016 |
20170235658 | ANALYSIS DEVICE AND ANALYSIS METHOD | 08-17-2017 |