An information handling system may include an air mover configured to drive an airflow, an information handling resource, and an annular-shaped heat pipe thermally coupled to the information handling resource and located downstream of the air mover and such that the airflow flows proximate to the annular-shaped heat pipe when the air mover drives the airflow.
An information handling system may include at least one processor and a memory. The information handling system may be configured to store a first set of data comprising an operating system in a first location; store a second set of data comprising application data in a second location; expose the first and second sets of data in a combined union mount filesystem; and create a backup of the second set of data, but not the first set of data, by creating a copy of the second location.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
3.
Information Technology Ecosystem Environment for Performing a Sustainability Operation
A system and method for performing an information technology (IT) ecosystem monitoring and management operation. The IT ecosystem monitoring and management operation includes executing a sustainability application on a hardware processor of an IT component; an IT sustainability ecosystem console, the IT sustainability ecosystem console comprising an IT sustainability system, the IT sustainability system comprising a sustainability component, the sustainability component communicating with the sustainability application to perform a sustainability operation; and, communicating between the sustainability component and the sustainability application to perform a sustainability operation.
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for processing a target object. The method includes acquiring an initial non-video feature vector on the basis of at least one input of a received speech input and text input. The method further includes taking, in response to not receiving a video input, a default feature vector as an initial video feature vector corresponding to the video input. The method further includes generating a video feature, a speech feature, and a text feature on the basis of the initial non-video feature vector and the initial video feature vector. The method further includes generating a processing parameter for a target object on the basis of the video feature, the speech feature, and the text feature, wherein the processing parameter includes at least one of an emotion parameter, an attribute parameter, and a pose parameter.
G06T 1/00 - Traitement de données d'image, d'application générale
G10L 15/02 - Extraction de caractéristiques pour la reconnaissance de la parole; Sélection d'unités de reconnaissance
G10L 25/06 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par le type de paramètres extraits les paramètres extraits étant des coefficients de corrélation
G10L 25/57 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation pour le traitement des signaux vidéo
5.
SYSTEM AND METHOD FOR SUPPORTING HARDWARE COMPONENTS
Methods, systems, and devices for providing computer implemented services are disclosed. To provide the computer implemented services, the quantity of hardware resources available for providing the computer implemented services may be modified. The quantity of hardware resources may be modified by adding removable cards to a host system. When the removable card is added, a removable attachment element may be used to secure the removable card in place and maintain operable connection between the host system and the removable card.
A method comprises receiving work order data, wherein the work order data identifies at least one technical support issue requiring resolution. The work order data is analyzed using one or more machine learning algorithms. The method further comprises predicting, based at least in part on the analyzing, whether the at least one technical support issue will be resolved at one or more respective service locations of a plurality of service locations. Based at least in part on the predicting, a recommendation to respond to the at least one technical support issue at a given service location of the plurality of service locations is generated.
Executing functions in serverless platforms leveraging metadata is disclosed. Embodiments of the invention related to using metadata when placing and/or executing functions. The metadata includes request metadata, container or function metadata, node metadata, and/or data metadata. The metadata allows a function to be placed and executed in a manner that accounts for user intent, container requirements, node resources, and data location. Functions can be placed across different serverless platforms. Once the metadata is evaluated and a location is selected, a function is placed and executed at the selected location.
Methods, apparatus, and processor-readable storage media for automatically predicting dispatch-related data using machine learning techniques are provided herein. An example computer-implemented method includes obtaining data, from one or more user channels, pertaining to at least one issue; determining, based at least in part on the obtained data, that at least one dispatch is to be carried out in connection with attempting to resolve the at least one issue; predicting, by processing at least a portion of the obtained data using one or more machine learning techniques, an approval mode associated with the at least one dispatch and at least one outcome associated with the at least one dispatch; and performing one or more automated actions based at least in part on one or more of the predicted approval mode and the at least one predicted outcome.
Embodiments of the present disclosure relate to a method, a device, and a computer program product for rendering an image. The method includes determining, based on a coordinate value of a target point in a target scenario and a viewing direction for the target point, a rendering parameter for the target point. The method further includes adjusting the rendering parameter based on the viewing direction and by performing an upsampling operation on the rendering parameter. The method further includes rendering an image for the target scenario based on the adjusted rendering parameter. By means of the method, resources required by processing of image data are reduced; the image data processing speed is increased; and fast rendering of a high-resolution image can be achieved.
A disclosed event notification management method and service for use with a multi-node, hyper-converged infrastructure (HCl) cluster employs a service running on a corresponding node to monitor one or more parameters associated with event notifications sent to a cluster. The service may adjust a node's notification interval based on the monitored parameters. The parameters may include a last event notification successful (LENS) parameter indicating whether a recent notification was successful and a severity parameter determined based on an urgency type of a plurality of pending notifications within an event queue. The service may employ a first formula to decrease the notification interval following a successful previous notification and a second formula to increase the notification interval following an unsuccessful notification. The magnitude by which the notification interval is adjusted may be influenced by the severity parameter, e.g., to aggressively reduce the notification interval following successful notifications when urgency is high.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
H04L 41/06 - Gestion des fautes, des événements, des alarmes ou des notifications
11.
EFFICIENT PATH STATE REPORTING FOR UNIFORM HOST ATTACHMENT CONFIGURATION
Host access to a system DS1 can be configured for a logical device L1 so that L1 is exposed to the host over path P1 from DS1. Prior to configuring host access to L1 on another system DS2, configuration information of DS1 can be updated to include a fully populated uniform host configuration for the host with respect to L1. The fully populated uniform host configuration can identify P1 as well as path P2 between DS2 and the host. Even though P2 may not be established so that L1 is not yet exposed to the host over P2, DS1 can use the information included in the fully populated uniform host configuration to report information to the host regarding path state information for P1 and P2. The host can directly query DS2 regarding P2 in order to determine current up-to-date information regarding the path state of P2 with respect to L1.
The technology described herein is directed towards increasing the secrecy capacity/performance of an intelligent reflective surface (IRS)-assisted communication system. Described is determining a location for placement of the IRS to achieve the maximum secrecy capacity with respect to a receiver in an environment. Gradient descent along with ray tracing, facilitates determination of the optimal placement, which can be used along with an alignment strategy of tile-allocation and phase-shift adjustment for the IRS to optimize the secrecy capacity within constraints. When implemented at the determined location, IRS-assisted communications result in significant improvement of the secrecy capacity performance for an (e.g., indoor) media communication network.
H04W 16/20 - Outils de planification de réseau pour déploiement de réseaux de couverture domestique ou de courte portée
H04B 7/04 - Systèmes de diversité; Systèmes à plusieurs antennes, c. à d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées
13.
RING ARCHITECTURE-BASED WORKLOAD DISTRIBUTION IN A MICROSERVICE COMPUTING ENVIRONMENT
Techniques are disclosed for managing workloads in data processing systems. For example, a method determines a set of containers for processing a given workload of data records, wherein each container of the set of containers is configured to process a given subset of the data records. The method causes deployment of the set of containers in a ring configuration to process the given workload of data records such that at least one of the containers in the ring configuration automatically processes one or more data records of a subset of data records assigned to another container in the ring configuration that becomes inactive.
A method and apparatus for automating creation of multiple simultaneous software development environments on a development machine is provided. Automation code, for example implemented using Python script, reads a text file such as a JSON file describing the development environment to be created. The automation code is configured to locate (locally or in a software repository) and download the supporting software identified in the text file and required to be included in the development environment. The automation code is also configured to determine a set of ports used by the supporting software to communicate with the development machine, and to search for a set of available ports on the development machine that are available and able to be mapped to the development environment. The automation code modifies supporting software configuration files to reflect the port assignments and builds a container including the software code and associated configuration files.
A system, method, and computer-readable medium for performing an information technology (IT) ecosystem management and monitoring operation. The IT ecosystem management and monitoring operation includes: executing a sustainability application on a hardware processor of an information handling system; providing an IT ecosystem monitoring and management console, the IT ecosystem monitoring and management console comprising an IT ecosystem sustainability system, the IT ecosystem sustainability system comprising a sustainability component; and, communicating between the sustainability component and the sustainability application to perform an IT inventory sustainability planning operation.
A system, method, and computer-readable medium for an information technology (IT) ecosystem management and monitoring operation. The IT ecosystem management and monitoring operation includes: executing a sustainability application on a hardware processor of an information handling system; providing an IT ecosystem monitoring and management console, the IT ecosystem monitoring and management console comprising an IT ecosystem sustainability system, the IT ecosystem sustainability system comprising a sustainability component; and, communicating between the sustainability component and the sustainability application to perform an IT environment sustainability operation.
H04L 41/0896 - Gestion de la bande passante ou de la capacité des réseaux, c. à d. augmentation ou diminution automatique des capacités
17.
Information Technology Ecosystem Environment for Generating Sustainability Information for Use When Integrating Sustainability and Information Technology Planning
A system, method, and computer-readable medium for performing an information technology (IT) ecosystem management and monitoring operation. The IT ecosystem management and monitoring operation includes: providing a sustainability application to an information handling system, the information handling system being located within an IT ecosystem; obtaining sustainability information regarding the information handling system via the sustainability application; providing an IT ecosystem monitoring and management console, the IT ecosystem monitoring and management console comprising an IT ecosystem sustainability system, the IT ecosystem sustainability system comprising a sustainability component; and, communicating between the sustainability component and the sustainability application to perform an IT inventory sustainability planning operation, the communicating providing the sustainability component with the sustainability information regarding the information handling system.
A system, method, and computer-readable medium for performing an information technology (IT) ecosystem management and monitoring operation. The IT ecosystem management and monitoring operation includes executing a sustainability application on a hardware processor of an information handling system; providing an IT ecosystem monitoring and management console, the IT ecosystem monitoring and management console comprising an IT ecosystem sustainability system, the IT ecosystem sustainability system comprising a sustainability component; and, communicating between the sustainability component and the sustainability application to perform an IT sustainability empowerment operation.
H04L 41/0896 - Gestion de la bande passante ou de la capacité des réseaux, c. à d. augmentation ou diminution automatique des capacités
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
19.
Information Technology Ecosystem Environment for Performing an Information Technology Environment Sustainability Operation
A system, method, and computer-readable medium for an information technology (IT) ecosystem management and monitoring operation. The IT ecosystem management and monitoring operation includes: providing a sustainability application to an information handling system, the information handling system comprising a modular component architecture; obtaining sustainability information regarding a component of the information handling system via the sustainability application; providing an IT ecosystem monitoring and management console, the IT ecosystem monitoring and management console comprising an IT ecosystem sustainability system, the IT ecosystem sustainability system comprising a sustainability component; and, communicating between the sustainability component and the sustainability application to perform an IT environment sustainability operation, the communicating providing the sustainability component with the sustainability information regarding the component of the information handling system.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
20.
Information Technology Ecosystem Environment for Performing an Information Technology Sustainability Empowerment Operation
A system, method, and computer-readable medium for performing an information technology (IT) ecosystem management and monitoring operation. The IT ecosystem management and monitoring operation includes providing a sustainability application to an information handling system; obtaining sustainability information regarding the information handling system via the sustainability application; providing an IT ecosystem monitoring and management console, the IT ecosystem monitoring and management console comprising an IT ecosystem sustainability system, the IT ecosystem sustainability system comprising a sustainability component; and, communicating between the sustainability component and the sustainability application to perform an IT sustainability empowerment operation, the communicating providing the sustainability component with the sustainability information regarding the information handling system.
G06F 21/50 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
21.
Information Technology Ecosystem Environment for Performing an IT Component Sustainability Servicing Operation
A system, method, and computer-readable medium for performing an information technology (IT) ecosystem management and monitoring operation. The IT ecosystem management and monitoring operation includes executing a sustainability application on a hardware processor of an information handling system; providing an IT ecosystem monitoring and management console, the IT ecosystem monitoring and management console comprising an IT ecosystem sustainability system, the IT ecosystem sustainability system comprising a sustainability component; and, communicating between the sustainability component and the sustainability application to perform an IT component sustainability servicing operation.
Machine learning model training using real and/or synthetic data is disclosed. Nodes contribute data to a central machine learning service. The data is used to train corresponding models whose generators, when trained, are configured to generate synthetic data according to a node's distribution. When a node is unavailable or for other reasons, the data contributed by the node for retraining a machine learning model includes at least some synthetic data from an enabled generator.
G06V 10/774 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant l’intégration et la réduction de données, p.ex. analyse en composantes principales [PCA] ou analyse en composantes indépendantes [ ICA] ou cartes auto-organisatrices [SOM]; Séparation aveugle de source méthodes de Bootstrap, p.ex. "bagging” ou “boosting”
23.
DECENTRALIZED FRAMEWORK FOR PROVIDING APPLICATION PROGRAMMING INTERFACE GATEWAYS
Methods, apparatus, and processor-readable storage media for implementing a decentralized framework for providing application programming interface gateways are described herein. An example computer-implemented method includes: determining a set of characteristics for one or more application programming interface gateways based at least in part on information characterizing one or more user inputs of at least one user; identifying a plurality of application programming interface gateways based at least in part on the set of characteristics; selecting one or more of the plurality of identified application programming interface gateways based at least in part on one or more selection criteria; and causing the selected one or more application programming interface gateways to be configured for the at least one user based at least in part on configuration data corresponding to the selected one or more application programming interface gateways.
H04L 67/60 - Ordonnancement ou organisation du service des demandes d'application, p.ex. demandes de transmission de données d'application en utilisant l'analyse et l'optimisation des ressources réseau requises
24.
MICROSTRIP DELAY MATCHING USING PRINTED DIELECTRIC MATERIAL
A printed circuit board includes a first and second microstrip circuit traces formed on an outer surface of the printed circuit board, and a patterned dielectric material applied over a first length of the first microstrip circuit trace. The first microstrip circuit trace has a first length and carries a first signal. The second microstrip circuit trace is adjacent to the first microstrip circuit trace, has a second length longer than the first length, and carries a second signal. The patterned dielectric material is provided over a portion of the first length to delay the first signal relative to the second signal.
An information handling system includes a protected memory that stores identifiers of locked down devices. The system receives a firmware update package for a device within the information handling system. The firmware update package includes a firmware update for the device. The system determines whether an identifier for the device is located within protected memory. If the identifier for the device is located within the protected memory, then the system prevents the firmware update for the device.
A method comprises collecting operational data corresponding to one or more components of at least one device and analyzing the operational data against one or more thresholds for component replacement. In the method, one or more alerts for at least one user are generated responsive to meeting the one or more thresholds. One or more communications are received from the at least one user in response to the one or more alerts. One or more replacement components for the one or more components are dispatched to the at least one user based at least in part on the received one or more communications. In analyzing the operational data, one or more databases are accessed to identify a support entitlement of the at least one user for the at least one device, and at least one threshold of the one or more thresholds corresponding to the identified support entitlement is identified.
A printed circuit board includes first and second insulating layers, first and second strip line circuit traces formed on a surface of the first insulating layer, and a patterned dielectric material. The first strip line circuit trace has a first length and carries a first signal. The second strip line circuit trace is adjacent to the first strip line circuit trace, has a second length longer than the first length, and carries a second signal. The patterned dielectric material is provided over a portion of the first length to delay the first signal relative to the second signal. The second insulating layer is affixed to the surface and covers the first and second strip line circuit traces and the patterned dielectric material.
Managing APIs of a web application, including: developing, at a local IHS, a web application that includes an API for providing a portion of the web application, the API associated with a first URL associated with a host IHS that provides a first version of the portion; temporarily modifying the API from being associated with the first URL to a second URL, including: receiving input at the local IHS indicating i) the second URL and ii) approval to associate the second URL with the API, wherein the second URL is associated with the local IHS; in response to the user input: updating settings for the web application such that the API is associated with the second URL, the second URL providing a second version of the portion; storing the updated settings in a session storage for a browser of the first IHS that provides for display the web application.
An information handling system and peripheral mouse establish level four security when a preloaded security identification packet is available to securely identify both devices for the exchange of pairing information in a manner that avoids man-in-the-middle attacks. The peripheral advertises with both a BLE protocol packet that supports a conventional level 3 security pairing and a secure identification packet that supports a level four security pairing. When the secure identification packet advertisement is selected by a host, the BLE profile may be populated without performing pairing so that the profile can be used to subsequently pair without risk of a malicious device imitating the BLE interface.
G06F 3/023 - Dispositions pour convertir sous une forme codée des éléments d'information discrets, p.ex. dispositions pour interpréter des codes générés par le clavier comme codes alphanumériques, comme codes d'opérande ou comme codes d'instruction
G06F 3/0354 - Dispositifs de pointage déplacés ou positionnés par l'utilisateur; Leurs accessoires avec détection des mouvements relatifs en deux dimensions [2D] entre le dispositif de pointage ou une partie agissante dudit dispositif, et un plan ou une surface, p.ex. souris 2D, boules traçantes, crayons ou palets
G06F 3/038 - Dispositions de commande et d'interface à cet effet, p.ex. circuits d'attaque ou circuits de contrôle incorporés dans le dispositif
H04W 12/037 - Protection de la confidentialité, p.ex. par chiffrement du plan de contrôle, p.ex. trafic de signalisation
H04W 76/14 - Gestion de la connexion Établissement de la connexion Établissement de la connexion en mode direct
Migration of data to maintain data resiliency, including receiving user-input indicating a first data resiliency of first data; storing the first data at a first storage device of the storage devices, the first storage device associated with the first data resiliency; monitoring vectors associated with performance of the storage devices; determining, based on the monitoring, that a particular vector fails to meet an associated performance criteria for the first data resiliency of the first data, and in response: analyzing characteristics of each of the storage devices, including a resiliency of each of the storage devices; identifying, based on the characteristics of each of the storage devices, a second storage device of the storage devices for migration of the first data such that the first resiliency of the first data is maintained; and migrating the first data from the first storage device to the second storage device
Methods, apparatus, and processor-readable storage media for security-based image classification using artificial intelligence techniques are provided herein. An example computer-implemented method includes obtaining one or more images; extracting text from at least a portion of the one or more images by processing the one or more images using at least a first set of one or more artificial intelligence techniques; classifying at least one of the one or more images, into one or more of multiple security-based classification categories, by processing at least a portion of the extracted text using at least a second set of one or more artificial intelligence techniques; and performing one or more automated actions based at least in part on the classifying of the at least one of the one or more images.
G06V 30/19 - Reconnaissance utilisant des moyens électroniques
G06V 10/82 - Dispositions pour la reconnaissance ou la compréhension d’images ou de vidéos utilisant la reconnaissance de formes ou l’apprentissage automatique utilisant les réseaux neuronaux
A system can maintain a first data store that stores first associations between subjects and first attributes, and a second data store that stores second associations between second attributes and permissions. The system can receive a query that identifies a user account and a resource. The system can determine, from the first data store and a context of the user account in initiating the query, first permissions for the user account with respect to the resource and given the context. The system can determine, from the second data store and the context, second permissions that are a precondition to access the resource given the context. The system can determine, based on whether there is an overlap between the first permissions and the second permissions, whether to approve the query. The system can respond to the query based on a result of the determining whether to approve the query.
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for video processing. The method includes: converting, based on a sample frame in a first video having a first resolution as well as a template, a first group of image frames in the first video that correspond to the sample frame to a second group of image frames that are more similar to the template. The method also includes: converting the second group of image frames to a third group of image frames having a higher resolution to generate a higher-resolution video. In this manner, low-resolution image frames can be first converted to image frames that are more suitable for resolution conversion, so that a high-resolution video of a higher quality can be obtained when reconstructing the high-resolution video.
Embodiments of the present disclosure relate to a method, a device, and a computer program product for executing computer programs. The method includes implementing multiple executions of a deep neural network that includes a hooking portion outside a trusted execution environment (TEE), wherein an operator in the hooking portion, when executed outside the TEE, invokes a corresponding execution operator in the TEE. During the period, the method includes determining, on the basis of the invocation of the corresponding execution operator in the TEE by the operator in the hooking portion, a computation graph corresponding to the hooking portion. The method further includes executing, on the basis of the computation graph, the execution operator corresponding to the hooking portion in the TEE during the execution of the deep neural network after the multiple executions.
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
A network-attached storage of a computing system connected to a network may monitor the network for file access commands from equipment of another computing system to identify whether one of the file access commands corresponds to a nefarious attempt to access information stored at the storage. A service, application, or script, running at the storage, may create a fake query and a fake response thereto. The fake query or corresponding response may contain information generated to attract an attacker that may be using the other computing system to passively monitor the network and, upon detecting the attractive, but fake, message information, transmit a request according to an address, or path, or other information that the fake message(s) may include. The service/app/script may notify the computing system that a potential hacker has infiltrated the system when it receives a request for information at the fake address or path.
In one or more embodiments, an information handling system may include: a chassis that houses the information handling system and that includes a stand configured to rotate away from and towards a portion of a rear side of the chassis; a heat transfer device (HTD) that includes a fluid; and at least one flexible thermally conductive foil (FTCF) thermally coupled to the HTD and thermally coupled the stand of the chassis. For example, the at least one FTCF may be configured to thermally transfer heat from the HTD to the stand of the chassis. In another example, the chassis may include at least one hinge that couples the stand to the chassis, in which the at least one hinge is configured to permit the stand rotate through an angle. For instance, the at least one hinge may permit the stand to be configured at different positions within the angle.
Embodiments of systems and methods to provide a firmware update to devices configured in a redundant configuration in an Information Handling System (IHS) are disclosed. In an illustrative, non-limiting embodiment, an IHS may include computer-executable instructions to receive a target firmware update image associated with a first of the devices, establish a shared memory communication channel with the first device, store the target firmware update image in the shared memory communication channel, and using the shared memory communication channel, perform a firmware update on the first device using the stored target firmware update image.
Plural cameras cooperate to define an overlap of fields of view that consolidate to provide an extended field of view communicated to an information handling system. The plural cameras stitch the non-overlapping portions into a consolidated visual image by reference to a landmark captured by both cameras in the overlapping portion, such as a reference marker placed in the extended field of view. The plural cameras coordinate through a wireless interface or with a daisy chain of communication cables to share the overlap boundary, resolution compatibility and an architecture for communicating the consolidated field of view with the information handling system.
A system for data processing, comprising a data processor configured to execute one or more algorithms stored in an internal memory device, a plurality of external data memory devices coupled to the data processor, each external data memory device including a header having predetermined data stored therein and a boot load protocol coupled to the data processor and the plurality of external data memory devices, the boot load protocol configured to interface with the data processor and the header of each of the plurality of external data memory devices and to generate a series of control data structures for use by the data processor to select one of the plurality of external data memory devices for use by the data processor.
A resource allocation engine distributes host resources, such as CPU cores, dynamically between a set of containers executing in the context of the host operating system. The resource allocation engine sets a lower limit on CPU allocation for each container to prevent the containers from being starved of CPU resources. The resource allocation engine monitors the utilization of the resources allocated to the containers, and redistributes the host resources dynamically among the containers based on the utilization values. Containers having high utilization values are assigned more resources correspondingly, and containers having low utilization values are assigned fewer resources. In some embodiments, the resource allocation engine assigns weights to the containers, and uses the weights to assign CPU resources for an upcoming assignment period. An operating system utility, such as C-groups, is used to implement the resource allocations to the containers for the assignment periods.
Techniques for snapshot classification involve generating a plurality of snapshots of a storage system at multiple times; clustering the plurality of snapshots into a first group of snapshots and a second group of snapshots based on data features of the plurality of snapshots; and determining a clean snapshot among the plurality of snapshots based on a comparison between the generation time of the first group of snapshots and the generation time of the second group of snapshots. Accordingly, a clean snapshot and a damaged snapshot can be automatically and quickly distinguished, thereby improving the efficiency of finding a clean snapshot and helping a user recover data quickly.
A processing device illustratively includes a processor coupled to a memory, and is configured to initiate a background copy process in a host device to copy data from a first storage system to a second storage system. The processing device receives input-output (IO) processing pressure feedback from at least one of the first and second storage systems, and adjusts one or more characteristics of the background copy process based at least in part on the received IO processing pressure feedback. The processing device may comprise, for example, host level mirroring (HLM) logic configured to control execution of the background copy process for one or more logical storage devices. Adjusting one or more characteristics of the background copy process based at least in part on the received IO processing pressure feedback may comprise, for example, reducing a rate of the background copy process responsive to the received IO processing pressure feedback.
Generation of new snapshots of a storage object are prompted based on changes to the storage object. An absolute storage change condition is satisfied when the aggregate amount of changed data since the most recent snapshot satisfies a threshold that represents a predefined amount of storage capacity, e.g., N GB. A percentage of used storage change condition is satisfied when the aggregate size of the changes expressed as a percentage of the provisioned storage capacity of snapped storage object satisfies a predetermined threshold, e.g., X % of Y TB. A percentage of provisioned storage change condition is satisfied when the aggregate amount of the changes in terms of percentage of utilized storage capacity of storage object satisfies a predetermined threshold expressed as a percentage of the utilized capacity of the storage object, e.g., P % of Z TB.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
Techniques are provided for software code verification using a comparison of software code identifiers. One method comprises obtaining a first software code identifier for a first version of software code, wherein the first software code identifier is obtained by applying a function to the first version of the software code; comparing a second software code identifier to the first software code identifier, wherein the second software code identifier is obtained by applying the function to a second version of the software code; and performing an automated action based on a result of the comparison. The comparison may detect a difference between the first and second versions of the software code. The first version of the software code may comprise software code associated with a first stage of a software development cycle and the second version of the software code may comprise software code associated with a different stage.
An embedded controller locks down one or more devices within an information handling system based on a detection of an operating system crash. A processor monitors an operating system executing within the information handling system, and detects the operating system crash. In response to the detection of the operating system crash, the processor notifies the embedded controller of the operating system crash.
G06F 11/22 - Détection ou localisation du matériel d'ordinateur défectueux en effectuant des tests pendant les opérations d'attente ou pendant les temps morts, p.ex. essais de mise en route
G06F 11/07 - Réaction à l'apparition d'un défaut, p.ex. tolérance de certains défauts
50.
SYSTEMS AND METHODS OF SUPPORTING DEDUPLICATION AND COMPRESSION OF ENCRYPTED STORAGE VOLUMES
Techniques for providing increased support for deduplication and compression of encrypted storage volumes. The techniques include receiving, at a storage virtual machine (VM), a data encryption key (DEK) associated with encrypted volume data, in which the DEK is wrapped in a key encryption key (KEK). The techniques include receiving, at the storage VM from a client virtual machine (VM), a write request specifying the encrypted volume data. The techniques include obtaining, by the storage VM, the KEK from a key management system (KMS) embedded on the storage VM. The techniques include unwrapping, by the storage VM, the DEK using the KEK, and decrypting, by an IO decryptor hosted by the storage VM, the encrypted volume data using the DEK. The techniques include performing, by the storage VM, data reduction operations on the decrypted volume data, and storing, by the storage VM, the data-reduced volume data on a storage array.
G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
A secure one-time programming undo system includes a component and a component configuration system. A one-time programming subsystem in the component configuration system provides the component with personality configuration information that configures the component to perform component operations, and performs a one-time programming operation that configures a component engine in the component to deny modification requests to modify the personality configuration information. A one-time programming undo subsystem in the component configuration system performs a one-time programming undo authentication operation, and transmits a one-time programming undo instruction that is associated with the one-time programming undo authentication operation to the component, with the one-time programming undo authentication operation configured to authenticate the one-time programming undo instruction to the component such that the component executes the one-time programming undo instruction that reconfigures the component engine in the component to allow modification requests to modify the personality configuration information.
A storage system calculates relative writability of SSDs and biases storage of data from write IOs to the SSD that has the greatest relative writability, where writability is a value calculated as a function of remaining wear-life and drive capacity. When the remaining wear-life of an SSD falls below a threshold, unstable data is evicted from that drive, where data stability is an indication of likelihood of data being changed. The drive with the greatest relative writability is selected as the target for the unstable data. The drive with the greatest relative writability is also selected as the donor for stable data that is moved to the free space created by eviction of the unstable data. Consequently, the SSD that triggers the low wear-life threshold processes fewer write IOs.
Automatic file system capacity management techniques are provided using file system utilization prediction. One method comprises obtaining input data representing a utilization of a storage capacity of a file system of a given storage system; predicting a future utilization of the storage capacity of the file system based on a portion of the obtained input data; and automatically adjusting the storage capacity of the file system based at least in part on a result of a comparison of the predicted utilization of the storage capacity to a current utilization of the storage capacity. The comparison of the predicted utilization to a current utilization of the storage capacity may comprise comparing the current utilization of the storage capacity to the predicted utilization of the storage capacity for at least first and second time periods following a current time period to determine a trend of the utilization of the storage capacity.
A system for processing data, comprising a virtual environment management system operating on a processor and configured to retrieve a predefined virtual computer desired state first plurality of hardware components and a first plurality of software components, a virtual computer operating on the processor and configured to provide a user-defined desired state for a second plurality of hardware components and a second plurality of software components and wherein the virtual environment management system is configured to compare the first plurality of hardware components and the first plurality of software components with the second plurality of hardware components and the second plurality of software components and to modify the predefined virtual computer desired state if there are any differences between the first plurality of hardware components and the first plurality of software components with the second plurality of hardware components and the second plurality of software components.
G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
55.
CALIBRATION AND TEST OF RADIOS SPANNING DIGITAL AND ANALOG DOMAINS
A system can comprise a radio unit that comprises a transmitter and a receiver. The system can further comprise a first hardware component that communicatively couples the transmitter and the receiver. The system can further comprise a second hardware component that is configured to transmit an analog signal from the transmitter to the receiver via the first hardware component. The system can further comprise a third hardware component that is configured to evaluate operation of the radio unit based on the analog signal received at the receiver.
One example method includes receiving a data event notification, retrieving data to which the data event notification pertains, analyzing the data, based on the analyzing, generating metadata pertaining to the data, and transmitting the metadata to a repository. These operations may be performed automatically in response to receipt of the data event notification. The data event notification may likewise be generated automatically in response to implementation of the data event, which may be any of a data create, read, update, or delete, operation.
In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, receiving information regarding a new sales opportunity from another computing device and determining one or more relevant features from the information regarding the new sales opportunity, the one or more relevant features influencing predictions of an opportunity outcome and an opportunity duration. The method also includes, by the computing device, generating, using a multi-target machine learning (ML) model, a first prediction of an opportunity outcome of the new sales opportunity and a second prediction of an opportunity duration of the new sales opportunity based on the determined one or more relevant features. The method may also include, by the computing device, sending the first and second predictions to the another computing device.
One example method includes copying selected backup data from a secondary storage system to a provisioned primary storage volume, creating a snapshot of the primary storage volume, using the snapshot to create a thin clone volume, masking the thin clone volume, and mounting the thin clone volume, and recovering the backup data from the thin clone volume. The recovered backup data may be made available to a secondary workload that includes an enterprise application.
G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement
G06F 11/20 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel en utilisant un masquage actif du défaut, p.ex. en déconnectant les éléments défaillants ou en insérant des éléments de rechange
59.
AUTOMATIC NETWORK POLICIES GENERATION IN CONTAINERIZED ENVIRONMENTS
Technology described herein relates to limiting microservice operation in response to security compromise of the microservice. A method can comprise facilitating, by a system operatively coupled to a processor, transmitting, to a container orchestrator controller that is part of a communication network, a network policy that, in response to deployment, operates to restrict, according to a restriction defined by the network policy, access between a first microservice and a second microservice of the communication network different from the first microservice, and instructing, by the system, the network policy to be deployed by the container orchestrator controller, to restrict, according to the restriction and in response to detection of a malfunction of the first microservice related to an intrusion to the first microservice, first connections employed during a flow between the first microservice and the second microservice by default and second connections that are not employed by default during the flow.
Techniques are provided for visual generation of software deployment pipelines using recommendations of development and operations (DevOps) blueprints. One method comprises obtaining information characterizing a technology type and a programming language for a selected software development project; recommending a DevOps blueprint for the selected software development project based on a technology type and a programming language for the selected software development project, wherein the DevOps blueprint comprises reusable software development resources for the technology type and the programming language; providing a graphical interface to present a visual representation of the reusable software development resources; obtaining information characterizing interactions of a user with the graphical user interface to select the reusable software development resources for a pipeline associated with the selected software development project; and automatically generating software code in a target programming language of the DevOps collaboration tool based on the reusable software development resources in the pipeline.
Methods, apparatus, and processor-readable storage media for automated subscription management for remote infrastructure are provided herein. An example computer-implemented method includes obtaining subscription data related to at least one subscription for hardware infrastructure provided by a service provider, wherein the subscription data is obtained by the hardware infrastructure at a remote location; obtaining usage data and deployment data for the hardware infrastructure that is associated with the at least one subscription; processing the subscription data, the usage data and the deployment data using an artificial intelligence-based framework to identify a time period for initiating performance of one or more actions to automatically adjust the at least one subscription, wherein the artificial intelligence-based framework identifies the time period based on historical subscription data related to one or more other subscriptions; and causing the performance of the one or more actions to be initiated within the identified time period.
H04W 8/20 - Transfert de données utilisateur ou abonné
H04L 41/0686 - Présence d’informations supplémentaires dans la notification, p.ex. pour l’amélioration de métadonnées spécifiques
H04W 8/18 - Traitement de données utilisateur ou abonné, p.ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateur; Transfert de données utilisateur ou abonné
62.
DEEP LEARNING METHODOLOGIES FOR SERVER THERMAL DESIGN
A system for designing a component, comprising a component design system operating on a processor that is configured to execute one or more algorithms to generate a digital component design model, a graphic information unitization system operating on the processor that is configured to execute one or more algorithms to receive the digital component design model and to convert it into a format for use with one or more design data attributes and a deep learning system operating on the processor that is configured to execute one or more algorithms to receive the converted digital component design model and the one or more design data attributes and to process the converted digital component design model and the one or more design data attributes using a deep learning algorithm to identify one or more design modifications.
G06F 30/27 - Optimisation, vérification ou simulation de l’objet conçu utilisant l’apprentissage automatique, p.ex. l’intelligence artificielle, les réseaux neuronaux, les machines à support de vecteur [MSV] ou l’apprentissage d’un modèle
A port manager is configured to implement adaptive port ceiling assignment for background Input/Output (I/O) operations between heterogeneous storage arrays. The port manager generates a set of test I/O operations, applies the I/O operations to a port under test, determines a response time to complete the I/O operations on the port under test, and compares the response time of the current test with response times of a set of previous tests. Based on the test values, the port manager identifies a throughput inflection point for the port under test, which is used to set a maximum throughput of the port under test. The adaptive ceiling for the port under test is then set based on the maximum throughput times a ceiling percentage threshold value. The determined adaptive ceiling value is then used to prospectively limit background I/O operations on the port under test.
An information handling system polls telemetry data from sensors associated with a central processing unit, and determines current offsets for each one of the sensors based on the telemetry data. The system may also determine a domain current offset associated with a calibration domain, determine a voltage regulator offset based on the domain current offset, and adjust power provided by the voltage regulator to the central processing unit based on the voltage regulator offset.
G06F 1/28 - Surveillance, p.ex. détection des pannes d'alimentation par franchissement de seuils
G06F 1/3296 - Gestion de l’alimentation, c. à d. passage en mode d’économie d’énergie amorcé par événements Économie d’énergie caractérisée par l'action entreprise par diminution de la tension d’alimentation ou de la tension de fonctionnement
An apparatus comprises a processing device configured to determine, based on monitoring input/output (IO) operations, an IO activity level and a given IO pattern of a given storage object for a designated period of time, the given storage object being stored on a first storage tier of a storage system. The processing device is also configured to determine a write penalty associated with writing storage objects having the given IO pattern to a second storage tier of the storage system. The processing device is further configured to determine, based on the IO activity level of the given storage object and the determined write penalty, whether to move the given storage object from the first to the second storage tier and to move, responsive to an affirmative movement determination, the given storage object to the second storage tier.
A button mechanism includes a button, a module, and a thin sheet spring. The thin sheet spring is in physical communication with the button and with the module. The thin sheet spring exerts a tension force on the button and the module to bias the button toward a normal position. In response to a force greater than the tension force being exerted on the button, a portion of the thin sheet stretches to enable the button to be placed in a contact position. In response to the force being removed from the button, the tension force causes the thin sheet to snap back to an original position and biases the button toward the normal position.
H01H 13/7073 - Interrupteurs ayant un organe moteur à mouvement rectiligne ou des organes adaptés pour pousser ou tirer dans une seule direction, p.ex. interrupteur à bouton-poussoir ayant une pluralité d'éléments moteurs associés à différents jeux de contacts, p.ex. claviers avec des contacts portés par ou formés à partir de couches dans une structure multicouche, p.ex. interrupteurs à membrane caractérisés par la structure, le montage ou l'agencement des organes d'actionnement, p.ex. des boutons-poussoirs ou des touches caractérisés par le mécanisme entre les touches et les claviers multicouches caractérisés par des ressorts, p.ex. des ressorts de type Euler
67.
Offload inefficient slicing from clients to the servers
Embodiments of the invention relate to methods and systems for efficiently sharing assets such as files and folders between a host computer system and a client computer system while minimizing the amount of work the client must perform to efficiently transfer an asset. In one or more embodiments, assets such as files and folders that are to be shared or transferred are placed in appropriate network slice queues by the hosts rather than the clients. These network slice queues allow the files and folders to be placed in slices without utilizing the resources of the clients as well as much of the available network resources. This ensures efficient use of network resources, while minimizing the amount of work the hosts and/or clients must perform in order to perform a backup.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
G06F 16/172 - Mise en cache, pré-extraction ou accumulation de fichiers
G06F 16/176 - Support d’accès partagé aux fichiers; Support de partage de fichiers
68.
Intelligently associating a file with an application
A file can be intelligently associated with an application. When a user attempts to open a file on a user computing device, context for the file can be collected and provided to an intelligent file association engine. The intelligent file association engine can use the context to select an application to be used to open the file from among different applications. These different applications can include a local application, a VDI application, and a cloud application.
Embodiments of the present disclosure relate to a method, an electronic device, and a computer program product for retrieving service requests. The method includes determining a hash value of a service request based on the service request. The method further includes determining request pairs based on correlations between the hash value of the service request and a plurality of hash values of a plurality of historical service requests. The method further includes determining a semantic correlation between the service request and the historical service request in each of the plurality of request pairs. The method further includes determining, based on the determined semantic correlation between each request pair, a probability indicating that the service request and the historical service request in the request pair use the same solution. The method further includes determining a retrieved historical service request based on the probability.
Disclosed methods include sending, from a resource manager, network configuration information to each of one or more managed resources. The network configuration information may include an IP address for the resource manager, an IP address for each of the managed resources, and a predetermined timeout value. Network configurations for the resource manager and the one or more managed resources may then be set after which each managed resource may start a timer with the predetermined timeout value. If the resource manager detects successful completion of each of the network configuration operations, the resource manager may send a stop timer command to each of the managed resources. If a timeout occurs, the timeout will inform each of the managed resources that the change in network configuration was not entirely successful. The resource manager and each of the managed resources will then restore their network configurations to their previous configurations.
H04L 41/082 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant des mises à jour ou des mises à niveau des fonctionnalités réseau
H04L 41/08 - Gestion de la configuration des réseaux ou des éléments de réseau
H04L 41/0859 - Récupération de la configuration du réseau; Suivi de l’historique de configuration du réseau en conservant l'historique des différentes générations de configuration ou en revenant aux versions de configuration précédentes
71.
System and method for distributed management of hardware through relationship management
Methods and systems for managing distributed systems are disclosed. The distributed systems may include any number of data processing systems that may contribute to the functionality of the distributed system. To contribute to the functionality of the distributed system, each of the data processing systems may need to be configured to positively contribute to one or more functions. To manage configuration of data processing system, intermediate representations of roles may be used to flexibly manage system configuration. The roles may be taken on by independent and dependent data processing systems.
H04L 41/5041 - Gestion des services réseau, p.ex. en assurant une bonne réalisation du service conformément aux accords caractérisée par la relation temporelle entre la création et le déploiement d’un service
H04L 41/5006 - Création ou négociation de contrats, de garanties ou de pénalités au niveau du service [SLA]
H04L 41/5022 - Pratiques de respect de l’accord du niveau de service en donnant des priorités, p.ex. en attribuant des classes de service
H04L 43/065 - Génération de rapports liés aux appareils du réseau
72.
Utilizing customer service incidents to rank server system under test configurations based on component priority
An information handling system instantiates a hardware configuration generator to generate platform configurations. The hardware configuration generator provides a ranked list of the platform configurations, receives platform customer service request information, provides a ranked list of part numbers associated with the platform configurations based upon the customer service request information, and modifies the ranked list of platform configurations based upon the ranked list of part numbers.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/5074 - Traitement des plaintes des utilisateurs ou des tickets d’incident
Systems and methods for detecting collaboration sessions and other workloads in a heterogeneous computing platform are described. In some embodiments, an Information Handling System (IHS) may include a heterogeneous computing platform having a plurality of devices and a memory coupled to the heterogeneous computing platform, where the memory includes a plurality of sets of firmware instructions, where each set of firmware instructions, upon execution by a respective device, enables the respective device to provide a corresponding firmware service, and where at least one of the plurality of devices operates as an orchestrator configured to collect telemetry from the plurality of devices and detect a collaboration session based, at least in part, upon the telemetry.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
A method for generating one or more quantum circuits to be evaluated by one or more QPUs is disclosed. The method includes obtaining a problem to be solved using one or more QPUs and analyzing the problem for reductions in complexity to obtain a reduced problem. One or more quantum algorithms are generated to implement a potential solution to the reduced problem, and the quantum algorithms are translated into one or more quantum circuits. The method further includes transmitting the one or more quantum circuits to the one or more QPUs.
G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p.ex. couplage ou commande de qubit
G06Q 10/047 - Optimisation des itinéraires ou des chemins, p. ex. problème du voyageur de commerce
76.
FUNCTION-BASED SERVICE FRAMEWORK BASED ON TRUSTED EXECUTION ENVIRONMENT
Techniques for integrating a trusted execution platform with a function-based service framework are disclosed. For example, a method comprises reading configuration information identifying at least one data providing party and at least one function providing party, and generating, based at least in part on the configuration information, an enclave comprising a circuit configured to execute a function. The method further comprises receiving in the enclave and via at least a first secure communication channel, the function from the at least one function providing party, and receiving in the enclave and via at least a second secure communication channel, data from the at least one data providing party. The function and the data are sent to the circuit, wherein the circuit executes the function to compute at least one output based at least in part on the data.
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
An example methodology includes, by a computing device, determining that a reset of credentials associated with one or more service accounts is to be performed. The method also includes, by the computing device, responsive to a determination that the reset of the credentials is to be performed, shutting down instances of applications in which the one or more service accounts are used and resetting the credentials associated with the one or more service accounts, wherein resetting the credentials updates current credentials associated with the one or more service accounts to new credentials. The method further includes, by the computing device, propagating the new credentials to the applications in which the one or more service accounts are used and starting the instances of the applications in which the one or more service accounts are used, wherein the started instances of the applications use the new credentials.
Systems and methods for selecting camera settings during a collaboration session in a heterogenous computing platform are described. In some embodiments, an Information Handling System (IHS) may include a heterogeneous computing platform having a plurality of devices and a memory coupled to the heterogeneous computing platform, where the memory includes a plurality of sets of firmware instructions, where each set of firmware instructions, upon execution by a respective device, enables the respective device to provide a corresponding firmware service, and where at least one of the plurality of devices operates as an orchestrator configured to receive a policy and select a camera setting during a collaboration session, at least in part, based upon the policy.
Systems and methods for managing user engagement during collaboration sessions in heterogenous computing platforms are described. In some embodiments, an Information Handling System (IHS) may include a heterogeneous computing platform comprising a plurality of devices and a memory coupled to the heterogeneous computing platform, where the memory includes a plurality of sets of firmware instructions, where each set of firmware instructions, upon execution by a respective device, enables the respective device to provide a corresponding firmware service, and where at least one of the plurality of devices operates as an orchestrator configured to receive a user engagement cue during a collaboration session and process the user engagement cue.
Systems and methods for sign language processing during collaboration sessions in heterogenous computing platforms are described. In some embodiments, an Information Handling System (IHS) may include a heterogeneous computing platform comprising a plurality of devices and a memory coupled to the heterogeneous computing platform, where the memory comprises a plurality of sets of firmware instructions, where each set of firmware instructions, upon execution by a respective device, enables the respective device to provide a corresponding firmware service, and where at least one of the plurality of devices operates as an orchestrator configured to: receive a policy from an Information Technology Decision Maker (ITDM) or Original Equipment Manufacturer (OEM), and select a sign language processing setting usable during a collaboration session based, at least in part, upon the policy.
Systems and methods for equalizing audio during a collaboration session in a heterogenous computing platform are described. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include: a heterogeneous computing platform comprising a plurality of devices, and a memory coupled to the heterogeneous computing platform, where the memory comprises a plurality of sets of firmware instructions, where each set of firmware instructions, upon execution by a respective device, enables the respective device to provide a corresponding firmware service, and where at least one of the plurality of devices operates as an orchestrator configured to: receive a policy from an Information Technology Decision Maker (ITDM) or Original Equipment Manufacturer (OEM), and select an audio equalization setting usable during a collaboration session based, at least in part, upon the policy.
G10L 25/30 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par la technique d’analyse utilisant des réseaux neuronaux
82.
PROFANITY FILTER FOR COLLABORATION SESSIONS IN HETEROGENOUS COMPUTING PLATFORMS
Systems and methods for filtering profanities during collaboration sessions in heterogenous computing platforms are described. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include: a heterogeneous computing platform having a plurality of devices and a memory coupled to the heterogeneous computing platform, where the memory includes a plurality of sets of firmware instructions, where each set of firmware instructions, upon execution by a respective device, enables the respective device to provide a corresponding firmware service, and where at least one of the plurality of devices operates as an orchestrator configured to: receive a policy from an Information Technology Decision Maker (ITDM) or Original Equipment Manufacturer (OEM), and select a profanity filter setting usable during a collaboration session based, at least in part, upon the policy.
G10L 25/51 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation
G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
Systems and methods for memory serviceability mitigation are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: after failure of a memory device, notify a cloud service and enter a mitigation mode of operation with respect to the memory device, receive a message from the cloud service indicative of the provisioning of a replacement memory device, and, in response to the message and upon detection of a chassis intrusion event, leave the mitigation mode of operation with respect to the replacement memory device.
G06F 11/16 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel
G06F 11/20 - Détection ou correction d'erreur dans une donnée par redondance dans le matériel en utilisant un masquage actif du défaut, p.ex. en déconnectant les éléments défaillants ou en insérant des éléments de rechange
84.
SYSTEM AND METHOD FOR TUNING ANTENNAS USING QUALITY OF SERVICE MANAGEMENT AND RECEIVED ACCESS POINT TELEMETRY
An information handling system and method is disclosed comprising a processor, a memory, a power management unit (PMU), at least one tunable antenna, and an antenna controller executing code instructions configured to receive access point (AP) telemetry information from one or more wireless APs, wherein the AP telemetry information is received within a fast initial link setup (FILS) discovery beacon frame including the AP telemetry information, determine a band/channel score for a plurality of radiofrequency bands and channels available for the wireless adapter to access the one or more wireless APs, receive local telemetry at the information handling system, and determine a recommendation for a band/channel change for the wireless adapter and trigger a band or antenna switching in accordance with the recommendation.
Systems and methods for detecting and configuring imaging optimization settings during a collaboration session in a heterogenous computing platform are described. In some embodiments, an Information Handling System (IHS) may include a heterogeneous computing platform having a plurality of devices and a memory coupled to the heterogeneous computing platform, where the memory includes a plurality of sets of firmware instructions, where each set of firmware instructions, upon execution by a respective device, enables the respective device to provide a corresponding firmware service, and where at least one of the plurality of devices operates as an orchestrator configured to receive telemetry data and change an imaging optimization setting during a collaboration session, at least in part, based upon the telemetry data.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
An information handling system includes a motherboard installed within a chassis, a first backplane coupled to the motherboard, a second backplane coupled to the motherboard. The first backplane is located in a front side of the chassis, and is configured to receive first add-in modules from the front of the chassis. The second backplane is located in a middle portion of the chassis, and is configured to receive second add-in modules. The second add-in modules are positioned above DIMMs installed in the motherboard.
A printed circuit board includes metal layers, a metalized circuit via interconnecting a first one of the metal layers and a second one of the metal layers, and a back-drill hole drilled to remove metalization of the circuit via from a third metal layer adjacent to the second metal layer to a fourth metal layer at a first surface of the printed circuit board. The back-drill hole has a profile that includes a first undercut at a bottom of the first back-drill hole.
Within a domain such as a data center, host server activity monitors running on storage nodes observe meaningful commands sent by host servers to the storage nodes. Inactivity indicated by failure of any of the activity monitors to receive a meaningful command from a host server within a predetermined time limit prompts generation of a message that identifies that host server as possibly being unused. The host server activity monitors are also configured to identify as a possible unused host server any host server that is zoned for at least one of the storage nodes but not masked to any storage objects. If a quiescent host server becomes active, as indicated by resumption of sending meaningful commands to one of the storage nodes, then a message warning of a potential malicious attack is generated.
Targetless snapshots of a storage object are characterized in terms of likelihood of access using time-series analysis. Metadata of replication data structures of individual targetless snapshots is maintained in either uncompressed or compressed form based on the characterization of the targetless snapshot. Metadata is compressed at the page level, with same-pages of all replication data structures of cold snapshots of a storage object being compressed together. Compressed pages of targetless snapshot metadata are maintained of storage devices selected based on storage device performance and the time-series characterization of the targetless snapshot.
G06F 16/174 - Systèmes de fichiers; Serveurs de fichiers - Détails d’autres fonctions de systèmes de fichiers Élimination de redondances par le système de fichiers
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p.ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
G06F 16/11 - Administration des systèmes de fichiers, p.ex. détails de l’archivage ou d’instantanés
G06F 16/178 - Techniques de synchronisation des fichiers dans les systèmes de fichiers
90.
AUTOMATED SHARING OF REMOTE DEVICES BY MULTIPLE USERS USING A FILE SYSTEM
Techniques are provided for automated sharing of remote devices by multiple users using a file system. One method comprises maintaining public keys for source devices associated with users; configuring a primary target device to provide a file system that comprises: (i) a user-specific directory for each of the users, and (ii) a global directory accessible by the users, wherein the user-specific directory for a given user comprises the public key for the source devices associated with the given user; and configuring a secondary target device to provide a copy of the file system, wherein updates to the file system are provided to the secondary target device, and wherein the given user accesses the primary and/or the secondary target device, using a particular source device, based on an evaluation of the public key for the particular source device obtained from the user-specific directory for the given user.
Systems and methods for managing telemetry services in a heterogeneous computing platform are described. In some embodiments, an Information Handling System (IHS) may include a heterogeneous computing platform having a plurality of devices and a memory coupled to the heterogeneous computing platform, where the memory includes a plurality of sets of firmware instructions, where each set of firmware instructions, upon execution by a respective device, enables the respective device to provide a corresponding firmware service, and where at least one of the plurality of devices operates as an orchestrator configured to: receive a policy from an Information Technology Decision Maker (ITDM) or Original Equipment Manufacturer (OEM) and collect telemetry from at least one of the plurality of devices based, at least in part, upon the policy.
G06F 21/73 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par création ou détermination de l’identification de la machine, p.ex. numéros de série
Systems and methods for enabling voice commands and managing voice command settings during collaboration sessions in heterogenous computing platforms are described. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include a heterogeneous computing platform having a plurality of devices and a memory coupled to the heterogeneous computing platform, where the memory includes a plurality of sets of firmware instructions, where each set of firmware instructions, upon execution by a respective device, enables the respective device to provide a corresponding firmware service, and where at least one of the plurality of devices operates as an orchestrator configured to: receive a voice command during a collaboration session and process the voice command.
One example method includes registering, by a customer, with a service provider, receiving, by the customer from the service provider, a global machine learning model, running, by the customer, the global machine learning model as a local machine learning model, collecting, by the customer, unlabeled data generated by edge devices operating in a customer domain, checking, by the customer, to determine if the customer domain has changed, and when it is determined that the customer domain has changed, performing, by the customer, a model adaptation process on the local machine learning model, and transmitting to the service provider, by the customer, gradients that comprise customer implemented changes to the local machine learning model.
Systems and methods for managing audio subsystem settings during collaboration sessions audio in heterogenous computing platforms are described. In some embodiments, an Information Handling System (IHS) may include a heterogeneous computing platform having a plurality of devices and a memory coupled to the heterogeneous computing platform, where the memory includes a plurality of sets of firmware instructions, where each set of firmware instructions, upon execution by a respective device, enables the respective device to provide a corresponding firmware service, and where at least one of the plurality of devices operates as an orchestrator configured to receive a policy and select an audio subsystem setting during a collaboration session, at least in part, based upon the policy.
Systems and methods for managing performance during collaboration sessions in heterogenous computing platforms are described. In some embodiments, an Information Handling System (IHS) may include a heterogeneous computing platform comprising a plurality of devices and a memory coupled to the heterogeneous computing platform, where the memory includes a plurality of sets of firmware instructions, where each set of firmware instructions, upon execution by a respective device, enables the respective device to provide a corresponding firmware service, and where at least one of the plurality of devices operates as an orchestrator configured to: receive, during a collaboration session, contextual data usable to identify at least one of: user presence, or user engagement; and modify an IHS performance setting based, at least in part, upon the contextual data.
One example method includes receiving a rule-set, including a combination of rules, that was determined to occur in a set of ground truth documents, applying the rule-set to a new document that was not included in the set of ground truth documents, determining whether or not a rule in the rule-set succeeded or failed when applied to a word in the new document, and when the rule is determined to have failed, identifying the failed rule, identifying a confidence level in the determination that the rule failed, and when the confidence level is below a threshold confidence level, identifying the word, to which the failed rule was applied, as a candidate for verification by a human.
One example method includes running a workload through a trained open-set classification model, recovering, as a result of the running, a class and an open-setness score corresponding to the workload, determining, based on the class and the open-setness score, whether the workload is new, and when the workload is determined to be new, starting a new cluster that includes the workload. A response time predictor model may be used to predict a response time associated with the new workload.
A system, method, and computer-readable medium for performing a data center asset alert operation. The data center asset alert operation includes: monitoring a plurality of data center assets; determining when a first data center asset of the plurality of data center assets generates a first data center asset alert; determining when a second data center asset of the plurality of data center asserts generates a second data center asset alert; determining when the first data center alert and the second data center alert are substantively similar; and, generating a recommendation when the first data center alert and the second data center alert are substantively similar.
H04L 41/069 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant des journaux de notifications; Post-traitement des notifications
H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p.ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
99.
Degradation assessment for a 5-dimensional twin framework
One example method includes receiving input from each degradation module in a group of degradation modules, and each of the degradation modules operates to track degradation of a respective dimension of a digital twin, determining, using the input, the individual degradation of each of the dimensions of the digital twin, determining, using the individual degradations for the dimensions, an overall degradation for the digital twin as a whole, and identifying, and implementing in an entity represented by the digital twin, a remedial action corresponding to one of the individual degradations.
An input device for an information handling system ay detect an adjustment to a position of a damping medium of a linear magnetic ram of the input device. The input device may generate haptic feedback based on the detected adjustment to the position of the damping medium of the linear magnetic ram of the input device.