Monitoring (epo) Patents (Class 714/E11.179)
  • Patent number: 11194746
    Abstract: Drive information related to data storage drives may be exchanged or communicated among switches and hosts to allow the switches and hosts access to the data storage drives. For example, each of the hosts may provide and maintain a storage stack to access data storage on storage drives operably coupled thereto and data storage drives operably coupled to other hosts.
    Type: Grant
    Filed: December 22, 2017
    Date of Patent: December 7, 2021
    Assignee: Seagate Technology LLC
    Inventors: Sumanranjan Swadesranjan Mitra, Robert Walker
  • Patent number: 10509690
    Abstract: The exposing of a server function to a browser. From the browser's perspective, the browser submits a request for a web page to a web server, the web page being one of multiple web pages in a web application offered by the web server. The web server responds to the request by, for at least one of the server functions, formulating a corresponding script language function that defines a matching name and parameter set of the server side function. The script language function has a body that, when executed, serializes at least the name and parameter set of the server side function. The web server then provides the web page code and the corresponding script language function to the browser. The browser may then calls the server side function via the script language function.
    Type: Grant
    Filed: April 16, 2018
    Date of Patent: December 17, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Vikas Ahuja, Brian Charles Blomquist
  • Patent number: 10108657
    Abstract: Methods, systems, computer program products, and articles of manufacture for processing events are described. An event is obtained and the event is processed to generate data using a first set of one or more operators. The generated data is stored in a first column store with a first row/transaction identifier and the first row/transaction identifier is stored in one or more first processing queues to enable further processing of the event using a second set of one or more operators.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: October 23, 2018
    Assignee: SYBASE, INC.
    Inventors: Palaniappan Gandhi, Shubhra Biswas
  • Patent number: 9584379
    Abstract: An event monitoring system that includes two stages, an event sorting stage and an event processing stage. The event sorting stage receives events provided by at least one application, and includes multiple event sorting systems. The event processing stage includes at least one event processing system that processes events forwarded by the event sorting stage. The event processing system(s) is/are capable of processing events that fall within a particular set of one or more context partitions that correspond to the respective event processing system. As the event sorting system receives an event, the event sorting system identifies which context partition the event falls within. The event sorting system then identifies the event processing system that corresponds to the identified context partition of the event, and then forwards the event to the identified event processing system. The event processing system then applies the set of one or more monitoring rules.
    Type: Grant
    Filed: June 20, 2013
    Date of Patent: February 28, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Aleksandr Klimov, Vitaly Filimonov, Alexandre Zakonov
  • Patent number: 9483238
    Abstract: A solution providing for the dynamic design, use, and modification of models using a declarative software application meta-model that provides for self-modification of a collection of the models is provided. The solution can enable continuous real-time testing, simulation, deployment, and modification of the collection of the models. A model in the collection of the models can represent an entity or a function and can be included in a set of related models. Additionally, a set of related models can include a plurality of sets of related models. The collection of the models can represent, for example, one or more software applications, processes, and/or the like.
    Type: Grant
    Filed: July 6, 2015
    Date of Patent: November 1, 2016
    Assignee: EnterpriseWeb LLC
    Inventors: Dave M. Duggal, William J. Malyk
  • Patent number: 9026394
    Abstract: The present disclosure generally relates to the automated testing of a system that includes software or hardware components. In some embodiments, a testing framework generates a set of test cases for a system under test using a grammar. Each test case may perform an action, such as provide an input to the system under test, and result in an output from the system under test. The inputs and outputs are then compared to the expected results to determine whether the system under test is performing correctly. The data can then be interpreted in the grammar system or used as input to a fault isolation engine to determine anomalies in the system under test. Based on identified faults, one or more mitigation techniques may be implemented in an automated fashion.
    Type: Grant
    Filed: August 4, 2011
    Date of Patent: May 5, 2015
    Assignee: Wurldtech Security Technologies
    Inventors: Nathan John Walter Kube, Daniel Malcolm Hoffman, Frank Marcus
  • Patent number: 8732296
    Abstract: A system, method, and computer program product are provided for redirecting internet relay chat (IRC) traffic identified utilizing a port-independent algorithm and controlling IRC based malware. In use, IRC traffic communicated via a network is identified utilizing a port-independent algorithm. Furthermore, the IRC traffic is redirected to a honeypot.
    Type: Grant
    Filed: May 6, 2009
    Date of Patent: May 20, 2014
    Assignee: McAfee, Inc.
    Inventors: Vinoo Thomas, Nitin Jyoti, Cedric Cochin, Rachit Mathur
  • Publication number: 20140108868
    Abstract: A database server includes logic that is operable to monitor and analyze at least events occurring within an environment of the database server and/or execution errors generated by the database server in order to detect whether a problem condition exists. The database server further includes logic that is operable to send one or more commands to a database driver of a client that is communicatively connected to the database server, the one or more commands specifying one or more actions to be taken by the database driver in response to the existence of the problem condition. The database driver includes logic that is operable to receive the one or more commands from the database server and logic that is operable to cause the one or more commands to be executed.
    Type: Application
    Filed: October 16, 2012
    Publication date: April 17, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Matthew A. Neerincx, Luiz F. Santos, Oleg Ignat, David B. Lomet, Quetzalcoatl Bradley, Raghu Ram, Chadwin J. Mumford, Peter Gvozdjak, Balendran Mugundan
  • Publication number: 20140101487
    Abstract: A network device is configured to receive information from a plurality of device. The network device is configured to further analyze the information and determine that a performance or fault issue exists relating to operation of a device. The network device is configured to further send first information to a user device. The user device is to receive an instruction on eliminating the performance or fault issue. The network device is configured to further receive second information to resolve the performance of fault issue relating to the operation of the device; and send a notification to resolve the performance or fault issue relating to the operation of the device.
    Type: Application
    Filed: October 4, 2012
    Publication date: April 10, 2014
    Applicant: VERIZON PATENT AND LICENSING INC.
    Inventors: Deepak KAKADIA, Benjamin J. PARKER, Emerando M. DELOS REYES
  • Publication number: 20140095940
    Abstract: A method of correlating the timing of multiple interleaved trace data streams. A Time Stamp Trace stream logic monitors the event trace stream for a synchronization point. When a synchronization point is detected a time stamp value is inserted into the trace stream along with any relevant identification markers available in the detected synchronization point.
    Type: Application
    Filed: October 2, 2012
    Publication date: April 3, 2014
    Applicant: TEXAS INSTRUMENTS INCORPORATED
    Inventor: Jason L. Peck
  • Publication number: 20140095943
    Abstract: A device and method for predictively precaching content on a mobile communication device includes monitoring numerous data sources for contextual data on the activities of the user. The mobile communication device predicts network connectivity outages and affected applications using the contextual data. The mobile communication device notifies the affected applications of the predicted network connectivity outage, and in response the affected applications precache suitable content. The affected applications may employ several precaching strategies in response to the notification, such as downloading content from a remote content server, adjusting content streaming, or adjusting content buffering prior to the predicted network connectivity outage. During the network outage, application service is provided using the precached content. Such precaching may also be accomplished using a local caching proxy server.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Tobias M. Kohlenberg, Rita H. Wouhaybi, Stanley Mo, Mubashir A. Mian
  • Publication number: 20140082434
    Abstract: Some embodiments of the present disclosure relate to a watchdog timer having an enhanced functionality that enables the watchdog timer to monitor a process flow of the microprocessor on a task-by-task basis that enables a simple output signal to be used to determine if the watchdog timer is malfunctioning. The watchdog timer has a state machine that increments a state variable from an initial value over a watchdog period. A deterministic service request, received from a microprocessor, controls operation of the watchdog timer. The deterministic service request has an indicator of a monitoring operation to be performed, a password, and an estimated state variable. A comparison element determines if the microprocessor is operating properly based upon a comparison of the received password to an expected password and the received estimated state variable to an actual state variable.
    Type: Application
    Filed: September 14, 2012
    Publication date: March 20, 2014
    Applicant: Infineon Technologies AG
    Inventors: Richard Knight, Simon Brewerton
  • Publication number: 20140082430
    Abstract: A system facilitates reporting product status information using a visual code. The system includes a code generator and a communication device. The code generator reports a product status with aggregate information in a visual code. In order to achieve this functionality, the code generator recognizes a status event trigger for a product. The code generator also compiles the aggregate information in response to the status event trigger for the product. The aggregate information includes product status information and product identification information. The code generator also generates the visual code representative of the aggregate information. The communication device facilitates communication of the visual code to a user.
    Type: Application
    Filed: September 14, 2012
    Publication date: March 20, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David B Bartlett, James C Fletcher
  • Publication number: 20140032977
    Abstract: Systems and methods for managing operation performance are included herein. In one example, a method includes determining an operation execution time. The method also includes storing the operation execution time. Furthermore, the method includes calculating an operation performance characteristic based on the operation execution time. The method also includes determining a threshold based on the operation performance characteristic. Additionally, the method includes determining the operation execution time is above the threshold. In addition, the method includes providing a warning based at least on the operation performance characteristic and the threshold.
    Type: Application
    Filed: July 26, 2012
    Publication date: January 30, 2014
    Inventors: Michael G. Myrah, Balaji Natrajan, Shilpa B. Shrinivas
  • Publication number: 20140032975
    Abstract: A method and apparatus for monitoring changes to a block of data is disclosed. A computer sets a first hardware watchpoint to monitor changes to the block of data at a current location of the block of data in memory and a second hardware watchpoint to monitor changes at a selected location in the memory where a reference to the block of data is located. Responsive to the second hardware watchpoint being triggered by a change at the selected location where the reference to the block of data is located, the computer identifies a new location of the block of data in the memory based on the change that triggered the second hardware watchpoint. Subsequent to identifying the new location of the block of data, the computer then resets the first hardware watchpoint to monitor changes to the block of data at the new location of the block of data.
    Type: Application
    Filed: July 27, 2012
    Publication date: January 30, 2014
    Applicant: International Business Machines Corporation
    Inventors: Joshi Chandran, Shajith Chandran, Manish Kulshreshtha, Dilip Singh
  • Publication number: 20140026000
    Abstract: A highly available server system based on cloud computing comprises a central control management server, a cloud host server, a storage server and at least one application server; the central control management server is connected with at least one application server, and configured to respectively monitor at least one application server, if detecting that there exists an application server in the fault state among the at least one applications server, then the central control management server sends a first instruction message; the cloud host server is connected with the central control management server, and configured to receive the first instruction message, and call the target virtual machine image file from the storage server according to instructions of the first instruction message, and run the target virtual machine image file; the storage server is configured to store the corresponding virtual machine image file of at least one application server.
    Type: Application
    Filed: November 14, 2012
    Publication date: January 23, 2014
    Applicant: Jiangxi Electric Power Corporation Information and Communications Branch
    Inventors: Yong Ma, Pingping Fu, Fan Li, Liang Liang, Pengfei Yu, Wenjun Li
  • Publication number: 20140019812
    Abstract: A method of storing data on a storage medium includes determining a risk index associated with a performance of the storage medium, adjusting a refresh factor associated with at least a portion of the storage medium in response to determining the risk index, and performing a data refresh operation on the portion of the storage medium based at least in part on the on the refresh factor.
    Type: Application
    Filed: July 16, 2012
    Publication date: January 16, 2014
    Applicant: HGST Netherlands B.V.
    Inventor: Takahiro Saito
  • Publication number: 20140019811
    Abstract: Identifying computer system markers to understand computer system performance, in one aspect, may comprise identifying a set of executions of applications indicative of computer performance based on first values associated with a first set of artifacts in the set of executions. Two subsets of executions from said identified set of executions are selected based on second values associated with a second set of artifacts in the set of executions. One or more markers are identified by determining one or more third set of artifacts from the two subsets of executions that have an associated third value that is different in a first of the two subsets from a second of the two subsets of executions according to a criterion.
    Type: Application
    Filed: July 11, 2012
    Publication date: January 16, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Rajesh R. Bordawekar, Peter F. Sweeney
  • Publication number: 20130346786
    Abstract: Systems, methods, and software are provided for dynamically escalating service conditions associated with data center failures. In one implementation, a monitoring system detects a service condition. The service condition may be indicative of a failure of at least one service element within a data center monitored by the monitoring system. The monitoring system determines whether or not the service condition qualifies for escalation based at least in part on an access condition associated with the data center. The access condition may be identified by at least another monitoring system that is located in a geographic region distinct from that of the first monitoring system. Upon determining that the service condition qualifies for escalation, the monitoring system escalates the service condition to an escalated condition and initiates an escalated response.
    Type: Application
    Filed: June 20, 2012
    Publication date: December 26, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Greg Thiel, Jon Avner, Yogesh Bansal
  • Publication number: 20130311834
    Abstract: A computer hardware-implemented method, system, and/or computer program product prevents a cascading failure in a complex stream computer system causing an untrustworthy output from the complex stream computer system. Multiple upstream subcomponents in a complex stream computer system generate multiple outputs, which are used as inputs to a downstream subcomponent. An accuracy value is assigned to each of the multiple outputs from the upstream subcomponents, and weighting values are assigned to each of the inputs to the downstream subcomponent. The accuracy values and weighting values are utilized to dynamically adjust inputs to the downstream subcomponent until an output from the downstream subcomponent meets a predefined trustworthiness level.
    Type: Application
    Filed: May 21, 2012
    Publication date: November 21, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: ROBERT R. FRIEDLANDER, JAMES R. KRAEMER, JUSTYNA M. NOWAK, ELIZABETH V. WOODWARD
  • Publication number: 20130290783
    Abstract: A method of estimating a level of severity of a network fault is provided. Performance parameters are monitored on upstream and downstream links to terminal network elements on a network to detect potential network faults. An alarm is raised with respect to a potential network fault automatically if at least one of the performance parameters as monitored crosses a preset threshold. After an alarm is raised, a level of severity is assigned to the alarm based on pre and post forward error correction (FEC) bit error rates (BER). In addition, the total number of terminal network elements that are impacted by the network fault is estimated and, when multiple alarms are raised of an equal level of severity, a higher priority is placed upon an alarm that affects service to a greatest number of terminal network elements.
    Type: Application
    Filed: April 27, 2012
    Publication date: October 31, 2013
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: David B. Bowler, Brian M. Basile, Clarke V. Greene, Xiang He
  • Publication number: 20130290791
    Abstract: A method of mapping a network fault is provided. Information is received concerning geographical coordinates of terminal network elements and their association with shared network components. A performance parameter is transmitted via upstream network communications from the terminal network elements is monitored. Terminal network elements from which the monitored performance parameter are unacceptable relative to a predetermined threshold for the performance parameter are identified, and a cluster of terminal network elements estimated to be subject to a common network fault is defined. The cluster includes terminal network elements that are identified as reporting an unacceptable performance parameter, as being within a predetermined geographic distance from each other, and as being associated with a common shared network component. A geographic map is populated with a single cluster alarm and includes an identification of the terminal network elements within the cluster.
    Type: Application
    Filed: April 27, 2012
    Publication date: October 31, 2013
    Applicant: GENERAL INSTRUMENT CORPORATION
    Inventors: Brian M. Basile, David B. Bowler, Patrick R. Congdon, David Dankulich, Clarke V. Greene, Xiang He
  • Publication number: 20130283104
    Abstract: A system for predicting a failure of equipment from prior maintenance data of the equipment collected during a time duration estimate a number of preceding failures of the equipment prior to the time duration. The system constructs a model, based on the prior maintenance data, of an impact of an external intervention on a failure of the equipment. The system constructs a model, based on the constructed model of the impact of the external intervention and the estimated number of preceding failures, of a replacement policy of the equipment and a probability of a subsequent failure of the equipment in a subsequent time period.
    Type: Application
    Filed: May 23, 2012
    Publication date: October 24, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jonathan R. M. Hosking, Emmanuel Yashchin, Yada Zhu
  • Publication number: 20130275814
    Abstract: Various embodiments of systems and methods for monitoring a system are described herein. A request is received from a user to generate a system watch for monitoring a system. The request may include a primary system monitoring parameter to be included in the system watch. One or more system monitoring parameters correlated to the primary system watch are identified from a system monitoring parameter database. The system watch is generated based on the primary system monitoring parameter and at least one secondary system monitoring parameter from the identified one or more system monitoring parameters. In one aspect, the system monitoring parameter database is built based on system watch related input received for a plurality of system watches.
    Type: Application
    Filed: April 12, 2012
    Publication date: October 17, 2013
    Inventors: Shiva Prasad Nayak, Shridevi Baichwal, Ekantheshwara Basappa, Ramya Sharma, Savitha K. Sridhar
  • Publication number: 20130275813
    Abstract: A condition monitoring system including at least one computing device also includes a memory device configured to store data associated with a monitored device and at least one input channel that is configured to receive the data associated with the monitored device. The condition monitoring system further includes a processor coupled to the memory device and the at least one input channel. The processor is programmed to determine a potential fault condition by comparing at least a portion of the data associated with the monitored device with at least one scenario programmed therein. The at least one scenario is at least partially based on at least one predetermined event associated with at least one condition of the monitored device.
    Type: Application
    Filed: April 17, 2012
    Publication date: October 17, 2013
    Inventors: Karthikeyan Loganathan, Narasimham Lanka
  • Publication number: 20130246858
    Abstract: A device for use in monitoring operation of a plurality of system assets includes a storage device configured to store a model of a plurality of system assets and a processor coupled to the storage device. The processor is configured to receive data representative of a status of the system assets, and display, in a first display state, a plurality of asset images representative of the system assets using the model. The processor is also configured to display, in a second display state, a first asset image of the asset images within the display upon a determination that the system asset represented by first asset image is in an alarm state, and display, in a third display state, the remaining asset images within the display upon a determination that the system assets represented by the remaining asset images are not in an alarm state.
    Type: Application
    Filed: March 15, 2012
    Publication date: September 19, 2013
    Inventors: Kenneth Paul Ceglia, Scott Terrell Williams, Charles Terrance Hatch, David Michael Robertson
  • Publication number: 20130232374
    Abstract: Remotely servicing and diagnosing a client device, including: establishing a persistent two-way connection between a server and the client device using a messaging and presence protocol; reading and analyzing statistics and settings of the client device when the persistent two-way connection has been established; detecting any problem with the client device from reading and analyzing statistics and setting of the client device; addressing and fixing the problem with the client device. Keywords include persistent connection, and remote servicing and diagnosing.
    Type: Application
    Filed: March 2, 2012
    Publication date: September 5, 2013
    Applicants: SONY NETWORK ENTERTAINMENT INTERNATIONAL LLC, SONY CORPORATION
    Inventors: Charles McCoy, Aran Sadja, Ling Jun Wong, True Xiong
  • Publication number: 20130212440
    Abstract: A system and method for virtual system management. A set of data received from a plurality of data sensors may be analyzed, each sensor monitoring performance at a different system component. Sub-optimal performance may be identified associated with at least one component based on data analyzed for that component's sensor. A cause of the sub-optimal performance may be determined using predefined relationships between different value combinations including scores for the set of received data and a plurality of causes. An indication of the determined cause may be sent, for example, to a management unit. A solution to improve the sub-optimal performance may be determined using predefined relationships between the plurality of causes of problems and a plurality of solutions to correct the problems.
    Type: Application
    Filed: February 13, 2012
    Publication date: August 15, 2013
    Inventors: Li-Raz Rom, Doron Girmonski, Yaron Shmueli, Meir Bechor, Dan Eidelman
  • Publication number: 20130198575
    Abstract: An example system includes a bus, a logic device, a controller, and a non-volatile memory. The bus is configured to propagate data including at least system console output data. The logic device is configured to monitor the data on the bus and to store the system console output data in a buffer. The controller is configured to detect a system error, and, in response to the system error, to acquire at least a portion of the system console output data from the buffer. The non-volatile memory is configured to store the portion of the system console output data acquired by the controller.
    Type: Application
    Filed: January 30, 2012
    Publication date: August 1, 2013
    Inventor: Sahba Etaati
  • Publication number: 20130166963
    Abstract: A computer implemented method may include identifying one or more business process runtime events received at an events queue of a process integration runtime component. One or more errors associated with the business process runtime events may be identified. The one or more errors may be evaluated based, at least in part, on one or more rules associated with the business process runtime event and configuration information associated with the process integration runtime component. The one or more rules may be associated with the business process runtime event and configuration information associated with the process integration runtime component having the same format. An alert for the one or more errors associated with the business process runtime event can be stored.
    Type: Application
    Filed: December 21, 2011
    Publication date: June 27, 2013
    Inventor: Tihomir Stoyanov
  • Publication number: 20130166962
    Abstract: Techniques for managing errors within an application are provided. Embodiments monitor errors occurring in each of a plurality of portions of the application while the application is executing. An error occurring in a first one of the plurality of portions of the application is detected. Additionally, upon detecting the error occurring in the first portion, embodiments determine whether to prevent subsequent executions of the first portion of the application.
    Type: Application
    Filed: December 22, 2011
    Publication date: June 27, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael J. Branson, John M. Santosuosso, Brandon W. Schulz
  • Publication number: 20130159778
    Abstract: A candidate to cause a fault is identified, in case that correlation destruction is detected in some processing apparatuses or the like due to spread of the fault within a system. A correlation destruction detecting unit 104 detects correlation destruction related to a correlation which is included in a correlation model 122 by applying inputted performance value of a monitored object to the correlation model 122 of the monitored object which a correlation model storing unit 112 stores. The fault analyzing unit 105 determines and outputs the monitored object which should be a candidate to cause a fault through comparing results of judging whether detecting or not detecting the correlation destruction related to a common correlation in a plurality of the monitored objects which are connected directly or indirectly with a common apparatus or common the monitored object and which have the correlation models 122 including the common correlation.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 20, 2013
    Inventor: Kentarou Yabuki
  • Publication number: 20130151907
    Abstract: A correlation mode is updated quickly in the case that monitored metrics arc changed. The correlation model storing unit 112 stores a first correlation model including a correlation detected for a pair of metrics in first plural metrics. The correlation model updating unit 103, in the case that a metric is added, judges existence of a correlation for each of pairs of metrics obtained by excluding the pair of metrics in first plural metrics from pairs of metrics in second plural metrics including the added metric and the first plural metrics, and generates a second correlation model by adding the detected correlation to the first correlation model.
    Type: Application
    Filed: December 13, 2011
    Publication date: June 13, 2013
    Inventor: Kiyoshi Nakagawa
  • Patent number: 8447918
    Abstract: A method of formatting a data storage device that includes a plurality of flash memory chips includes monitoring a failure rate of memory blocks of one or more flash memory chips of a storage device that has a first usable size for user space applications, estimating a future usable size of the data storage device based on the monitored failure rate, and defining, via a host coupled to the data storage device, a second usable size of the data storage device for user space applications based on the monitored failure rate.
    Type: Grant
    Filed: April 7, 2010
    Date of Patent: May 21, 2013
    Assignee: Google Inc.
    Inventors: Robert S. Sprinkle, Albert T. Borchers, Andrew T. Swing
  • Publication number: 20130111266
    Abstract: An error detection method is to detect an error in a program to control hardware, which executes predetermined processing, via a register. The error detection method includes: outputting a signal indicating whether the predetermined processing is in execution; detecting that a change is made in a register value in the register, which register value is related to control of the predetermined processing, and outputting a detection signal; and detecting an error when it is detected, based on the signal indicating whether the predetermined processing is in execution and on the detection signal, that the change is made in the register value while the predetermined processing is in execution.
    Type: Application
    Filed: October 23, 2012
    Publication date: May 2, 2013
    Inventor: Ryoh TOSAKA
  • Publication number: 20130103988
    Abstract: The disclosed invention provides a semiconductor device that enables early discovery of a sign of aged deterioration that occurs locally. An LSI has a plurality of modules and a delay monitor cluster including a plurality of delay monitors. Each delay monitor includes a ring oscillator having a plurality of gate elements. Each delay monitor measures a delay time of the gate elements. A CPU #0 determines if a module proximate to a delay monitor suffers from aged deterioration, based on the delay time measured by the delay monitor.
    Type: Application
    Filed: October 22, 2012
    Publication date: April 25, 2013
    Applicant: RENESAS ELECTRONICS CORPORATION
    Inventor: RENESAS ELECTRONICS CORPORATION
  • Publication number: 20130091391
    Abstract: A computing system includes a processor configured to identify a resource manager associated with a computing transaction, classify the computing transaction to determine a predetermined metric, measure an actual metric of the computing transaction, compare the predetermined metric to the actual metric to detect abnormal behavior in the transaction and model the abnormal behavior to determine how the resource manager is affected by the abnormal behavior.
    Type: Application
    Filed: October 11, 2011
    Publication date: April 11, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Karla K. Arndt, James M. Caffrey, Juliet C. Candee, Aspen L. Payton, William R. Richardson
  • Publication number: 20130086430
    Abstract: Various exemplary embodiments relate to a method and related network node including one or more of the following: determining that a diagnostic test should be performed on a hardware component of a plurality of hardware components, wherein the plurality of hardware components support a plurality of agent devices and at least one agent device of the plurality of agent devices is assigned to at least one of the plurality of hardware components; ensuring that no agent device of the plurality of agent devices is assigned to the hardware component; and after ensuring that no agent device of the plurality of agent devices is assigned to the hardware component, performing the diagnostic test on the hardware component, wherein at least one other hardware component of the plurality of hardware components continues operation during performance of the diagnostic test.
    Type: Application
    Filed: September 30, 2011
    Publication date: April 4, 2013
    Applicant: Alcatel-Lucent USA, Inc.
    Inventors: Eric J. Bauer, Randee S. Adams, William D. Reents, Mark M. Clougherty
  • Publication number: 20130080840
    Abstract: A multiplex system includes physical machines, and data communication cards respectively installed in the physical machines. If one of the physical machines equipped with an own data communication card is a physical machine of an own system and another one of the physical machines is a physical machine of another system, the data communication cards connect the physical machine of the own system and the physical machine of the other system communicably with each other over a communication network. Further, the data communication cards autonomously monitor the states of the physical machine of the own system and the physical machine of the other system and detect an abnormal state.
    Type: Application
    Filed: September 11, 2012
    Publication date: March 28, 2013
    Applicant: NEC CORPORATION
    Inventor: Kiyoshi BABA
  • Publication number: 20130073911
    Abstract: An apparatus for health monitoring includes a settings module, a field data module, a settings update module, and a monitoring module. The settings module is configured to store health monitoring settings for a plurality of monitored subsystems. The field data module is configured to receive field data, the field data comprising failure data of one or more systems of the same type as at least one of the monitored subsystems. The settings update module is configured to update the health monitoring settings stored by the settings module, wherein the health monitoring settings are updated based at least in part on the field data. The monitoring module is configured to perform one or more health monitoring tasks according to the health monitoring settings.
    Type: Application
    Filed: September 21, 2011
    Publication date: March 21, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Benjamin S. Terris, Richard A. Welp
  • Publication number: 20130073910
    Abstract: Systems and method for embedded trace macrocell (ETM) devices configured to dynamically interleave architecture/program tracing with microarchitecture/hardware tracing. An ETM device includes logic to enable interleaved program tracing and hardware state sampling. A core interface is configured to receive program trace and hardware state information of a microprocessor and a combining module is configured to interleave the program trace and hardware state information. A packet generation module may be configured to packetize the program trace and hardware state information into packets at operational speeds of the microprocessor.
    Type: Application
    Filed: September 20, 2011
    Publication date: March 21, 2013
    Applicant: QUALCOMM INCORPORATED
    Inventors: Suresh K. Venkumahanti, Prasanna Kumar Balasundaram, Robert A. Lester
  • Publication number: 20130073912
    Abstract: When a problem occurs in a service being provided, the degree of influence of the problem is evaluated comprehensively. An information processing device comprises: an obtaining means which obtains measured values with respect to an item to be monitored relating to an information service; a violation value calculation means which compares a plurality of conditions required relating to the item being monitored with the measured values and calculates a violation value indicating the degree of violation of condition; and an influence degree calculation means which calculates, using the violation value, the degree of influence of the violation of condition on the information service as an influence degree.
    Type: Application
    Filed: December 24, 2010
    Publication date: March 21, 2013
    Applicant: NEC CORPORATION
    Inventor: Haruka Yoshida
  • Publication number: 20130067287
    Abstract: An electronic control device includes: a processing unit that performs a predetermined process in accordance with a program; a watchdog timer that includes a time counter reset by a pulse signal output at a given period from the processing unit and outputs a signal having levels inverted depending on whether an overflow occurs; and a latch circuit that latches the signal output from the watchdog timer and outputs a signal obtained through the latching as a first output enable signal. The processing unit stops the output of the pulse signal, when diagnosing a malfunction of the watchdog timer, and diagnoses the malfunction of the watchdog timer based on the first output enable signal output from the latch circuit, after stopping the output of the pulse signal.
    Type: Application
    Filed: September 13, 2012
    Publication date: March 14, 2013
    Applicants: HONDA MOTOR CO., LTD., KEIHIN CORPORATION
    Inventors: Taku YOSHIKAWA, Takeshi YAMADA, Shinichi DAIBO, Yuichi KOBATA
  • Publication number: 20130067286
    Abstract: Systems, methods, and other embodiments associated with optimizing the use of replaceable memory cards and onboard memory as storage for data in cache are described. According to one embodiment, an apparatus includes a cache space manager configured to cause a cache processor to store data of a removable memory card of a memory device to an onboard memory of the memory device. The apparatus also includes an error rate monitor configured to monitor operating parameters of the removable memory card and to activate a cache processor to store the data from the removable memory card to the onboard memory when the operating parameters meet predetermined criteria.
    Type: Application
    Filed: August 28, 2012
    Publication date: March 14, 2013
    Inventors: Pantas SUTARDJA, Abhijeet P. GOLE
  • Publication number: 20130061097
    Abstract: A system monitors an application. The system includes a state table with state table nodes corresponding to application checkpoints. The state table nodes include an authorized time interval and application path. The system also includes a time counter that tracks an operation time between successive application checkpoints, and a program counter that tracks and stores an operation path for the application. A checkpoint module verifies an operation of the application at a checkpoint by comparing the authorized time interval for the checkpoint state table node and the operation time tracked by the time counter, as well as the authorized application path for the checkpoint state table node and the operation path tracked by the program counter. A security action is performed when the tracked operation time is not within the authorized time interval, or when the tracked operation path does not match the authorized application path.
    Type: Application
    Filed: May 14, 2012
    Publication date: March 7, 2013
    Inventors: Jacob Mendel, Alexander Potievsky
  • Publication number: 20130061098
    Abstract: The present invention is related to a failure check apparatus for performing a failure check of plural CPUs, wherein the failure check apparatus is configured to predict or detect a process load of the CPUs as a whole based on vehicle information related to processes of the CPUs, and change a way of performing a failure check according to a prediction or detection result of the process load. The CPUs may be CPUs in a multi-core processor. The failure check apparatus may perform the failure check if it is predicted or detected that the process load of the CPUs as a whole is lower than a predetermined reference.
    Type: Application
    Filed: May 10, 2010
    Publication date: March 7, 2013
    Applicant: TOYOYA JIDOSHA KABUSHIKI KAISHA
    Inventor: Eiichiro Shigehara
  • Publication number: 20130061095
    Abstract: A method detects soft failures as follows. A set of artifacts being generated by at least one process in a system is monitored. A number of artifacts being generated by the process is determined to be below a given threshold in response to the monitoring. The process is monitored in response to the determination. A current state of the process is determined in response to the analyzing. A notification is generated in response to the current state of the process including a set of abnormal behaviors.
    Type: Application
    Filed: November 1, 2012
    Publication date: March 7, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: International Business Machines Corporation
  • Publication number: 20130055034
    Abstract: A method for determining a suspect memory leak, including: sampling the throughput and memory usage of an application server; based on the sampled throughput, monitoring whether the throughput decrease continually, and based on the sampled memory usage, monitoring whether the memory usage remains stable within a predefined range; in response to a continual decrease of the throughput and the memory usage remaining stable within the predetermined range, determining that the application server is suspected of having a memory leak. Using the solution of the present invention can free an administrator of the burden of artificially identifying suspect servers, can identify a suspect server during runtime and further determine whether it actually has a memory leak.
    Type: Application
    Filed: August 28, 2012
    Publication date: February 28, 2013
    Applicant: International Business Machines Corporation
    Inventors: Jie Qiu, Hai Shan Wu, Jie Yang, Tao Yu
  • Publication number: 20130047039
    Abstract: Disclosed is a system and method for monitoring processes. The method includes the steps of monitoring at least one process in real time, collecting information on the at least one monitored process, analyzing the collected information in real time using at least one dynamic, updatable filter, identifying at least one triggering item or event matching at least one predetermined filter criterion, providing information regarding the at least one triggering item to an event processing engine for examination, and taking at least one action in real time in response to the identified triggering item or event. In certain embodiments, the method is implemented with a computer program product having a non-transitory computer readable medium having stored thereon computer executable instructions that when executed causes the computer to perform the method.
    Type: Application
    Filed: August 18, 2011
    Publication date: February 21, 2013
    Applicant: AVANQUEST SOFTWARE USA, INC.
    Inventors: Mark MANES, Jun LIU, David VANPEENE, Brent MERIWETHER, Kerry RODGERS
  • Publication number: 20130047040
    Abstract: Marking memory chips as faulty when a fault is detected in data from the memory chip. Upon detecting that a plurality of memory chips are faulty, determining which of a plurality of memory channels contains the faulty memory chips. Marking one of a plurality of memory channels as failing in response to determining that the number of failing memory chips has exceeded a threshold.
    Type: Application
    Filed: October 23, 2012
    Publication date: February 21, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: International Business Machines Corporation