Abstract: An apparatus comprises a processing device configured to collect system state information from host devices, to split the collected system state information into logical chunks, and to determine, based at least in part on a plurality of factors, a compression level to be applied to each of the logical chunks. The plurality of factors comprise a first factor characterizing a time at which the collected system state information is needed at a destination device and at least a second factor characterizing resources available for at least one of performing compression of the collected system state information and transmitting the collected system state information over at least one network to the destination device. The processing device is further configured to apply the determined compression level to each of the logical chunks to generate compressed logical chunks, and to transmit the compressed logical chunks to the destination device.
Type:
Grant
Filed:
July 20, 2021
Date of Patent:
April 18, 2023
Assignee:
Dell Products L.P.
Inventors:
Parminder Singh Sethi, Lakshmi Saroja Nalam, Durai S. Singh
Abstract: An access credential is modified at one device, wherein the device is part of a secure private network of multiple devices. Each other device in the secure private network receives notification of the modification. The credential modification is implemented when at least a subset of the other devices each accept the credential modification.
Abstract: In general, embodiments relate to a method for managing a technical support session, comprising: generating a question path graph (QPG) based on a plurality of question sequences associated with technical support sessions, and displaying at least a portion of the QPG to a technical support person (TSP) during a technical support session.
Abstract: An information handling system includes a processor configured to store a first module of a software application, the first module of the software application selected based on customer journey information pertaining to usage of the software application. The processor begins execution of the first module prior to receipt of a second module of the software application, the second module selected based on the customer journey information.
Abstract: In general, embodiments relate to a method for managing a technical support session, comprising: determining a technical support issue (TSI) for a technical support session; identifying a question path graph (QPG) associated with the TSI; and displaying at least a portion of the QPG to a technical support person (TSP) during the technical support session.
Abstract: Techniques for management of data security are disclosed. For example, a method comprises collecting data from one or more devices, and predicting security levels of respective portions of the data using one or more machine learning algorithms. In the method, security configurations for a subset of the respective portions of the data are implemented based, at least in part, on corresponding predicted security levels of the subset of the respective portions.
Type:
Application
Filed:
June 7, 2022
Publication date:
December 7, 2023
Inventors:
Parminder Singh Sethi, Nithish Kote, Thanuja C
Abstract: A method comprises extracting data for one or more assets corresponding to a user, and analyzing the data using one or more machine learning models. The analyzing comprises predicting whether the one or more assets will require at least one of replacement and service. In the method, one or more entitlement recommendations for the user are generated based on the analysis, and the one or more entitlement recommendations are transmitted to the user.
Abstract: Aspects of the disclosure include an escalated authentication system based on user behavior patterns. A user's behavior pattern on a device is collected and/or learned. The collected or learned pattern can be compared to subsequent behavior patterns to determine whether the current user is genuine or suspicious. Users deemed suspicious are subject to increased authentication requirements, often on-the-fly.
Abstract: A user interface is presented to a user. The method determines whether or not to customize a size of one or more components on the user interface. The method then determines one or more candidate components on the user interface to customize, when a determination is made to customize a size of one or more components on the user interface. The method customizes the one or more candidate components on the user interface, and presents a customized user interface to the user.
Abstract: An access credential is modified at one device, wherein the device is part of a secure private network of multiple devices. Each other device in the secure private network receives notification of the modification. The credential modification is implemented when at least a subset of the other devices each accept the credential modification.
Abstract: A method comprises analyzing performance data of a system using one or more machine learning techniques. The system comprises a plurality of hardware components. In the method, a priority list of the plurality of hardware components is generated based on the analysis, and power from one or more power sources is distributed to one or more of the plurality of hardware components based on the priority list.
Abstract: A method comprises receiving a notification of an issue with at least one component of a plurality of components in a computing environment. One or more machine learning algorithms are used to determine one or more components of the plurality of components impacted by the issue with the at least one component. The method further comprises collecting operational data for the at least one component and the one or more impacted components.
Type:
Application
Filed:
January 15, 2021
Publication date:
July 21, 2022
Inventors:
Parminder Singh Sethi, Anannya Roy Chowdhury
Abstract: Various embodiments of the invention are related to a method of performing upgrades to a computing system. After an initial upgrade strategy is produced by a device emulation system, one or more embodiments of the invention may produce a more refined upgrade strategy based on changes in key aspects identified in the initial upgrade strategy. These key aspects or key identifiers of the system are monitored throughout the upgrade process and are used to refine the upgrade strategy.
Type:
Application
Filed:
April 18, 2022
Publication date:
October 19, 2023
Inventors:
Parminder Singh Sethi, Lakshmi Nalam, Shelesh Chopra, Malathi R
Abstract: A method comprises extracting data for one or more assets corresponding to a user, and analyzing the data using one or more machine learning models. The analyzing comprises predicting whether the one or more assets will require at least one of replacement and service. In the method, one or more entitlement recommendations for the user are generated based on the analysis, and the one or more entitlement recommendations are transmitted to the user.
Abstract: Graphical menu management may be based on variable-length inputs to a touch sensitive display. An information handling system displays a graphical user interface presenting a listing of messages, channels, or other content. When a user makes a gestural input to the touch sensitive display, the information handling system determines a relative length of the input. The information handling system generates a menu of options based on the relative length of the input.
Abstract: A method comprises analyzing performance data of a system using one or more machine learning techniques. The system comprises a plurality of hardware components. In the method, a priority list of the plurality of hardware components is generated based on the analysis, and power from one or more power sources is distributed to one or more of the plurality of hardware components based on the priority list.
Abstract: Various embodiments of the invention are related to a method of performing upgrades to a computing system. After an initial upgrade strategy is produced by a device emulation system, one or more embodiments of the invention may continue to refine the upgrade strategy if changes occur to key aspects of the system, before the upgrade is performed and/or completed. These key aspects or key identifiers of the system are monitored throughout the upgrade process and are used to refine the upgrade strategy.
Type:
Application
Filed:
April 18, 2022
Publication date:
October 19, 2023
Inventors:
Parminder Singh Sethi, Lakshmi Nalam, Shelesh Chopra, Malathi R
Abstract: An information handling system may obtain timing information for processing among layers of a first client-side information handling system, and compare the timing information to threshold values to provide a comparison. The information handling system may use the comparison to identify an area of the first client-side information handling system in which a problem exists, and initiate remedial action directed to the problem.
Abstract: Techniques are disclosed for moving operations between cloud and edge platforms. For example, a method comprises executing a machine learning algorithm on a cloud platform and analyzing results of executing the machine learning algorithm. Based at least in part on the analysis, a determination is made whether the machine learning algorithm should be additionally trained. Based at least in part on a negative determination further execution of the machine learning algorithm is transferred from the cloud platform to an edge platform.
Abstract: A user interface is presented to a user. The method determines whether or not to customize a size of one or more components on the user interface. The method then determines one or more candidate components on the user interface to customize, when a determination is made to customize a size of one or more components on the user interface. The method customizes the one or more candidate components on the user interface, and presents a customized user interface to the user.