Abstract: An apparatus comprises a processing device configured to receive, at a host operating system of a virtual machine host, a request to execute a virtual machine and to obtain, from a virtual trusted platform module running on the virtual machine host, credentials for logging in to a guest operating system of the virtual machine. The processing device is further configured to provide, to pre-boot authentication software associated with the virtual machine, the credentials obtained from the virtual trusted platform module, and to automatically log in to the guest operating system of the virtual machine utilizing the pre-boot authentication software and the provided credentials.
Abstract: A method for managing a client environment includes obtaining, by a client device upgrade manager, an upgrade estimation for a client device executing in the client environment, wherein the upgrade estimation corresponds to an application upgrade for an application, in response to the upgrade estimation: performing an optimal time slot analysis for the client device to identify a set of optimal time slots, presenting the set of optimal time slots to the client device, obtaining, by the client device, a requested time slot for the application, and in response to the requested time slot, initiating an installation of an application upgrade of the application.
Abstract: Techniques described herein relate to a method for managing support cases of clients. The method may include obtaining a support case associated with a client of the clients; in response to obtaining the support case, obtaining contextual information associated with the support case; obtaining client telemetry data associated with the support case; selecting a portion of training data that is similar to the support case based on the client telemetry data, the contextual information, and the support case; generating a prediction model using the portion of the training data and a classification algorithm; and generating predictions using the prediction model, the client telemetry data, the contextual information, and the support case.
Abstract: A method, comprising: detecting that a storage device is experiencing a failure, the storage device being part of a computing device; identifying a cooling fan that is associated with the storage device, the cooling fan being part of the computing device, the cooling fan being identified based on one or more data structures that map the cooling fan to the storage device; and increasing a speed of the cooling fan from a first speed level to a second speed level, the speed of the cooling fan being increased in response to detecting that the storage device is experiencing the failure, wherein the speed of the cooling fan is increased proactively.
Abstract: A method for performing an application upgrade includes: performing an emulation to generate an application upgrade strategy for applying a plurality of application upgrades on a client device; determining a user behavior of a user of the client device; generating an application upgrade summary list using the application upgrade strategy and the user behavior; providing the application upgrade summary list to the user of the client device; and after the providing, initiating upgrading of the client device using a reordered application upgrade strategy generated in response to feedback from the user, in which the reordered application upgrade strategy is generated based on the application upgrade strategy and the user behavior.
Abstract: One or more embodiments of this invention may improve the operating and upgrading of computing devices and systems. The computing device and/or system may receive information related to a plurality of application upgrades from an application monitoring agent. Based on the received information, a device emulation will be requested, and an emulation will be performed in response to generate an application upgrade strategy including such things as emulated (e.g., predicted) upgrade times. In order to produce a more refined upgrade strategy the various embodiments also consider key aspects of the device and the upgrades to produce one or more key identifiers. The key identifiers are monitored throughout the upgrade process and are used to refine the upgrade strategy.
Abstract: An apparatus comprises a processing device configured to identify, at a first microservice, a service call that is to be transmitted to a second microservice, and to modify the service call to include context information, the context information characterizing a current state of execution of one or more tasks by one of the first microservice and the second microservice. The processing device is further configured to provide, from the first microservice to the second microservice, the modified service call including the context information. The context information enables re-initiation of said one of the first microservice and the second microservice to continue execution of the one or more tasks from the current state.
Abstract: A method for managing a client environment includes monitoring, by an upgrade management agent, the client environment for an application abstention by a plurality of client devices of the client environment, in response to the monitoring, obtaining device configuration information corresponding to each of the plurality of client devices, performing a text pre-processing on the device configuration information to obtain pre-processed information, applying a relational analysis to the pre-processed information to obtain a normalized context reference for application abstention corresponding to the plurality of client devices, and performing a clustering algorithm on the normalized context reference to generate a processed client intent dataset.
Abstract: A method including: initiating a migration of data from a source system to a destination system, the migration of data being configured to proceed based on a checkpoint set that includes a plurality of checkpoints; detecting whether any of the checkpoints in the checkpoint set is reached; obtaining a health score for the source system, the health score being obtained in response to any of the checkpoints being reached; if the health score satisfies a condition, executing an action to prevent a loss of data that is being migrated; and if the health score does not satisfy the condition, abstaining from executing the action to prevent the loss of data.
Type:
Grant
Filed:
April 22, 2022
Date of Patent:
May 21, 2024
Assignee:
Dell Products L.P.
Inventors:
Parminder Singh Sethi, Lakshmi S. Nalam, Atishay Jain
Abstract: A disclosed method and system for allocating bandwidth among a plurality of virtual network ports assigned to a plurality of virtual machines accesses assignment information indicating which virtual network ports are assigned to which virtual machines. A network bandwidth manager (NBM) receives network utilization information indicating the network utilization of each virtual network port/The NBM further receives virtual machine priority information indicative of a derived priority for each of the plurality of virtual machines. The NBM configures bandwidth parameters for each of the virtual network ports based on the assignment information, network utilization information, and the virtual machine priority information.
Abstract: A method comprising: receiving a configuration file that identifies a plurality of first log patterns, each of the first log patterns being associated with a respective component of an application and a respective malfunction of the respective component of the application; retrieving, by an application monitor, one more execution logs that are generated while the application is being executed; identifying, by the application monitor, a malfunction of the application based on the configuration file and the one or more execution logs, the malfunction being identified in response to a given one of the plurality of first log patterns matching an execution log pattern that is identified in the one or more execution logs; and reporting, by the application monitor, the malfunction to a technical support system.
Abstract: An information handling system (IHS) may include a battery management unit (BMU) that remains operational when the IHS in general is in a powered off state. A processor is operational when the IHS in general is in a powered on state but not when the IHS in general is in a powered off state. The BMU is configured to obtain charge and discharge pattern information while the IHS in general is in the powered off state, to transmit the charge and discharge pattern information to the processor when the IHS in general is in the powered on state, to receive user control information from the processor, and to control charge and discharge of a battery according to the user control information when the IHS in general is in the powered off state.
Abstract: A system and method model activities in the production environment as sequences of microservices, and identify unusual activities by analyzing these sequences. In particular, a directed graph of usual activity is formed as a basis for determining unusual activities. Next, activities that were actually performed are determined by statistically analyzing records of microservice invocation in application diagnostic files. These activity sequences are overlaid on the directed graph to determine relative fit by using a trace coverage percentage score. Application instances or activities with low relative fit are deemed suspicious. If the low fit persists for an extended duration, then the instances or activities are deemed unusual and an individual is alerted to begin a manual review.
Abstract: Embodiments include a method of storing digital data in a blockchain by receiving the digital data from a user, deduplicating the data in a deduplication system of the user to form deduplicated data, and encoding the deduplicated data into an array format for storage on a blockchain. A smart contract is deployed for deduplication on the destination side of the data, and the deduplicated data is encoded into a Binary Aligned Map (BAM) format for storage on the blockchain. A process on the destination side stores the deduplicated array data as a next block in the blockchain only if the next block agrees with the smart contract, and the blockchain is stored in system storage comprising hard disk, solid state, tape, or optical devices.
Abstract: A method for managing upgrades of components of clients includes obtaining an upgrade failure prediction request associated with a client of the clients, and in response to obtaining an update failure prediction request: obtaining live data associated with the client, matching the live data with a training data cluster, selecting relevant features associated with processed training data of the training data cluster, generating an upgrade failure prediction using the live data associated with the relevant features and a prediction model, making a determination that the upgrade failure prediction implicates an action is required, and based on the determination, initiating performance of the action.
Abstract: Various systems and methods are provided for using a response tracking plugin to detect and inform users in real time when one or more recipients of an email are actively responding to that email. In one embodiment, the functionality disclosed herein can be applied to an email that was sent to a plurality of recipients, including at least a first and second recipient, and where the email comprises a plugin that is configured to enable response tracking. One such embodiment comprises receiving the email; monitoring for a first pulse from the second recipient of the email, where the pulse is configured to indicate that the second recipient of the email has begun a reply to the email; and in response to receiving the first pulse, displaying an indication that comprises information about the second recipient of the email.
Abstract: A method for managing a client environment includes obtaining, by a client environment watcher of a production host environment, a set of actions performed by the client environment operatively connected to the production host environment, in response to obtaining the set of actions: performing an action filtering on the set of actions to obtain a set of filtered actions, wherein the set of filtered actions is associated with an attempt to resolve an issue with performing an application upgrade on the client environment, determining, using the set of filtered actions, a client-applied action set, and initiating an update to an issue analyzer model to obtain an updated issue analyzer model.
Abstract: An information handling system receives information from an input pointer, obtains a first coordinate from the information with respect to a first direction of a display, obtains a second coordinate from the information with respect to a second direction of a display screen, and obtains a third coordinate from a scrolling value representative of an amount of scrolling of a contiguous presentation of displayable information for display of a portion of the contiguous presentation of displayable information within the display. The system also obtains a fourth coordinate representative of a time at which the first coordinate and the second coordinate are obtained, and provides an unambiguous record of a user's navigation of the contiguous presentation of displayable information based on the first coordinate, the second coordinate, the third coordinate, and the fourth coordinate.
Abstract: Embodiments for storing digital data in DNA storage by receiving input file data, encoding the input file data into an oligonucleotide sequence to produce sequence data through a transformation of text to binary to Base_3 encoding, organizing the Base_3 sequence data into chunks of a defined chunk size, and storing the chunks in a block of a blockchain. The oligonucleotide sequence may comprise metadata for the input file data that refers to actual data stored in the DNA storage, where the actual data is formed by synthesizing the oligonucleotide sequence in a DNA synthesis process. The chunks may be stored in the blockchain only if the block agrees with a smart contract defined for the oligonucleotide sequence.
Abstract: One or more embodiments of this invention may improve the operating and upgrading of computing devices and systems. The computing device and/or system may receive information related to a plurality of application upgrades from an application monitoring agent. Based on the received information, a device emulation will be requested, and an emulation will be performed in response to generate an application upgrade strategy including such things as emulated (e.g., predicted) upgrade times. In order to produce a more refined upgrade strategy the various embodiments also consider key aspects of the device and the upgrades to produce one or more key identifiers. The key identifiers are monitored throughout the upgrade process and are used to refine the upgrade strategy.