Abstract: A method comprises collecting data from a computing environment comprising one or more storage devices, wherein the data comprises information identifying assignments of the one or more storage devices to one or more servers in the computing environment. In the method, the data is analyzed using one or more machine learning algorithms, wherein the analyzing comprises predicting whether a given configuration of the one or more storage devices in combination with the one or more servers is a specified configuration. The method also includes generating a storage configuration recommendation for a user based on the analysis, and transmitting the storage configuration recommendation to the user.
Abstract: Techniques are provided for dynamic snapshot scheduling. In an example, a dynamic snapshot scheduler can analyze historical data about storage system resources. The dynamic snapshot scheduler can use this historical data to predict how the storage system resources will be used in the future. Based on this prediction, the dynamic snapshot scheduler can schedule snapshot activities for one or more times that are relatively unlikely to experience system resource contention. The dynamic snapshot scheduler can then initiate snapshot activities at those scheduled times.
Abstract: A method for managing a client environment includes obtaining, by a client device upgrade manager, an upgrade estimation for a client device executing in the client environment, wherein the upgrade estimation corresponds to an application upgrade for an application, in response to the upgrade estimation: performing an optimal time slot analysis for the client device to identify a set of optimal time slots, presenting the set of optimal time slots to the client device, obtaining, by the client device, a requested time slot for the application, and in response to the requested time slot, initiating an installation of an application upgrade of the application.
Abstract: A method for managing a client environment includes monitoring, by an upgrade management agent, the client environment for an application abstention by a plurality of client devices of the client environment, in response to the monitoring, obtaining device configuration information corresponding to each of the plurality of client devices, performing a text pre-processing on the device configuration information to obtain pre-processed information, applying a relational analysis to the pre-processed information to obtain a normalized context reference for application abstention corresponding to the plurality of client devices, and performing a clustering algorithm on the normalized context reference to generate a processed client intent dataset.
Abstract: In general, embodiments relate to a method for performing an application upgrade, comprising: receiving an application upgrade request to upgrade an application to a specific version from a client device; sending information related to the application upgrade to a vulnerability validator; determining, based on impact score information, that the specific version of the application has vulnerabilities; identifying, based on the determining, at least one fix for at least one of the vulnerabilities; generating an application upgrade package based on the specific version of the application and the at least one fix; and providing the application upgrade package to a client device upgrade manager.
Abstract: A method for generating an upgrade recommendation for a communication network includes: analyzing a dataset to generate a request category, in which the dataset comprises at least a request, a response to the request, and a corresponding response time, in which the request and the response are communicated over the communication network; generating a network slice corresponding to the request category; executing an emulation using the network slice and the request to generate an emulated response time for the request; comparing the emulated response time against the corresponding response time; determining, based on the comparison, a response time variation for the request; and generating the upgrade recommendation based on the response time variation.
Abstract: A method for managing data migration includes: obtaining a confidence level of a predicted failure state of an internal component (IC) of a source device, in which the IC is one of a plurality of ICs in the source device; making a first determination that the confidence level exceeds a predetermined confidence level threshold; making, based on the first determination, a second determination that a high priority network slice of a network exists; mapping, based on the second determination, data stored in the IC to the high priority network slice; and migrating the data to a target device via the high priority network slice.
Abstract: A method for managing a client environment includes obtaining, by a predictor, a future state prediction request associated with an application upgrade on an emulation of a client device, wherein the application upgrade failed; in response to the future state prediction request: obtaining live data associated with the application upgrade; performing natural language processing on the live data to obtain processed live data; applying a future state prediction model to the processed live data to generate a future state prediction; and initiating the remediation of the application upgrade based on the future state prediction.
Abstract: A system, method, and computer-readable medium are disclosed for attesting determining computer system fan usage and maintenance. A determination is made as to the architectural diagram or layout of a computer system. The diagram or layout shows components and fans that support the components. The architectural diagram or layout, where each virtual section shows a fan and the components. Operational load is determined for each virtual section over a period of time. A threshold value for particular periods to time, where the threshold value either is to low load periods or as to periods to increase or decrease speed of the fan to address operational load of the components.
Abstract: A method for performing an application upgrade includes: performing an emulation to generate an application upgrade strategy for applying a plurality of application upgrades on a client device; determining a user behavior of a user of the client device; generating an application upgrade summary list using the application upgrade strategy and the user behavior; providing the application upgrade summary list to the user of the client device; and after the providing, initiating upgrading of the client device using a reordered application upgrade strategy generated in response to feedback from the user, in which the reordered application upgrade strategy is generated based on the application upgrade strategy and the user behavior.
Abstract: An apparatus comprises a processing device configured to receive, at a host operating system of a virtual machine host, a request to execute a virtual machine and to obtain, from a virtual trusted platform module running on the virtual machine host, credentials for logging in to a guest operating system of the virtual machine. The processing device is further configured to provide, to pre-boot authentication software associated with the virtual machine, the credentials obtained from the virtual trusted platform module, and to automatically log in to the guest operating system of the virtual machine utilizing the pre-boot authentication software and the provided credentials.
Abstract: A system receives a first alert pertaining to a main part from a managed information handling system, determines whether an alternative part is available at the managed information handling system as a substitute for the main part, and determines a life expectancy of the alternative part. The system may also determine whether an expected level of service can be expected to be provided by the alternative part based on the life expectancy of the alternative part, select between a plurality of levels of criticality to apply to the first alert, and dispatch the first alert for resolution at a selected level of criticality.
Abstract: A method includes extracting data pertaining to a plurality of user actions in connection with one or more changes to one or more of a plurality of applications, and training one or more machine learning models with the extracted data. The one more machine learning models are used to predict whether a user should receive a given notification in connection with a given change to a given application of the plurality of applications. In response to predicting that the user should receive the given notification, content of the given notification is determined. The method further includes generating the given notification for the user, and transmitting the given notification to the user.
Abstract: An apparatus comprises a processing device configured to identify, at a first microservice, a service call that is to be transmitted to a second microservice, and to modify the service call to include context information, the context information characterizing a current state of execution of one or more tasks by one of the first microservice and the second microservice. The processing device is further configured to provide, from the first microservice to the second microservice, the modified service call including the context information. The context information enables re-initiation of said one of the first microservice and the second microservice to continue execution of the one or more tasks from the current state.
Abstract: In general, embodiments relate to a method for detecting vulnerabilities of an installed application, comprising: obtaining information related to an application installed to a client device; sending, by an application monitoring agent, the information related to the application installed to the client device to a vulnerability validator; determining by the vulnerability validator, based on impact score information, whether a specific version of the application installed to the client device has vulnerabilities; sending the impact score information to a client device upgrade manager; and notifying, based on the impact score information, the client device when the application installed to the client device has vulnerabilities.
Abstract: One example method, includes checking, by an intelligent time detector service running on a computing system, a trial period duration of software on the computing system, starting, by the intelligent time detector service, a counter for the software, and the counter is operable to generate a counter value based on a clock of the computing system, storing, by the intelligent time detector service, a counter value of the counter, and decommissioning, by the intelligent time detector service, the software after the trial period has expired.
Type:
Grant
Filed:
June 17, 2021
Date of Patent:
March 19, 2024
Assignee:
EMC IP HOLDING COMPANY LLC
Inventors:
Parminder Singh Sethi, Madhuri Dwarakanath, Bing Liu
Abstract: In general, embodiments relates to a method for managing a technical support session, comprising: obtaining technical support question from a technical support person (TSP) that is conducting the technical support session; determining that the technical support question is a duplicate of a prior technical support question; in response to the determination, obtaining a quality score for the technical support question; and displaying the quality score to the TSP in a user interface on a technical support system that the TSP is using the conduct the technical support session.
Abstract: A method for managing a client environment includes obtaining, by an issue analyzing engine, a notification for an issue based on an application upgrade on a client device of the client environment, in response to the notification: applying an issue analyzing model to device configuration information associated with a client device to obtain a solution set, providing the solution set to client environment, obtaining a result from the client environment associated with the issue and the solution set, and updating the issue analyzing model based on the result to obtain an updated issue analyzing model.
Abstract: In one aspect, an example methodology implementing the disclosed techniques can include, by a baseboard management controller (BMC), responsive to a virtual console of a server being launched on a client device via the BMC, collecting one or more environment parameters of the client device and collecting one or more environmental parameters of the server. The method can also include, by the BMC, determining an appropriate display configuration for the server based on an analysis of the one or more environment parameters of the client device and the one or more environmental parameters of the server and configuring a display configuration of the server in accordance with the determined appropriate display configuration.
Abstract: Techniques for failure prediction of controllers are disclosed. For example, a method comprises collecting data corresponding to operation of a plurality of controllers from one or more devices, and predicting, using one or more machine learning algorithms, at least one of degradation and failure of one or more controllers of the plurality of controllers based, at least in part, on the data corresponding to the operation of the plurality of controllers. Using the one or more machine learning algorithms, one or more corrective actions to prevent the at least one of the degradation and the failure of the one or more controllers are identified. Instructions comprising the one or more corrective actions are generated and transmitted to at least one user device.
Type:
Application
Filed:
November 8, 2022
Publication date:
May 9, 2024
Inventors:
Parminder Singh Sethi, Nithish Kote, Thanuja C