Abstract:
A device includes a memory including ways and a processor in communication with the memory. The processor is configured to execute logic. The logic can monitor a parameter of the processor or a device connected with the processor. The logic can allocate, based on the parameter, a number a ways and a size of ways of the memory for use by the processor. The logic can power down an unallocated number of ways and unused portions of the ways of the memory.
Abstract:
A data processing system (1) is programmed with an interface (2) for capturing events which arise, and a process engine (3) for automatically monitoring captured events to identify completion of steps, each comprising a plurality of events linked by dependency relationships; and to identify completion of processes, each comprising a plurality of steps linked by dependency relationships. Software functions (5) execute in response to output of the process engine (3). The process engine (3) processes events to recognize a plurality of potential steps, but terminates other potential steps when completion of a step is determined. The process engine (3) processes steps to recognize a plurality of potential processes, but terminates other potential process when completion of a process is determined. The dependency relationships include Boolean AND operators and Boolean OR operators. There is a discrete start event for each step and a discrete start step for each process. The engine executes a plurality of processes simultaneously, applying captured events in real time to relevant steps, some events being applied to a plurality of steps.
Abstract:
Present example embodiments relate generally to methods, systems, computing devices, and logic for managing a plurality of alarms initiated by a plurality of alarm sensors. The method comprises the steps of: receiving the plurality of initiated alarm, prioritizing the initiated alarms, creating an initiated alarm being a condition-based alarm when an initiated alarm satisfies an event condition, reprioritizing an initiated alarm when said initiated alarm satisfies a reprioritization condition, suppressing an initiated alarm, reporting an unsuppressed initiated alarm based on the prioritizing of said alarm, and providing information comprising an operator action for the unsuppressed initiated alarm and an initiated alarm suppressed based on the unsuppressed initiated alarm.
Abstract:
A plurality of multi-purpose diagnostic procedures are associated with a plurality of rules and defined using component types. The rules indicate an association between one or more condition events and a conclusion event. A management system specifies cause candidates based target rules associated with condition events related to the occurrence events, and specifies a multi-purpose diagnostic procedure in association with a target rule that is a basis of a selected cause candidate. The management system creates an expanded diagnostic procedure that is a diagnostic procedure to be performed on one or more management target components for specifying a more specific cause of the selected cause candidate or updating the certainty of the selected cause candidate based on the specified multi-purpose diagnostic procedure and configuration management information that is information about the configuration of a plurality of the management target components.
Abstract:
Provided is a management system managing a computer system including apparatuses to be monitored. The management system holds configuration information on the computer system, analysis rules and plan execution effect rules. The analysis rules each associates a causal event that may occur in the computer system with derivative events that may occur by effects of the causal event and defines the causal event and the derivative events with types of components in the computer system. The plan execution effect rules each indicates types of components that may be affected by a computer system configuration change and specifics of the effects. The management system identifies a first event that may occur when a first plan changing the computer system configuration is executed using the plan execution effect rules and the configuration information, and identifies a range where the first event affects using the analysis rules and the configuration information.
Abstract:
A monitoring system captures the behavior of distributed applications and also provides a framework for augmenting functionality of the application in response to user interactions and different states of the application and network. Network events exchanged between an application and an application server are captured and the local client events on the client device are also selectively captured. The different disparate network events and client events are then combined together during a replay operation to simulate the user experience during the previous application session.
Abstract:
A system collects system management facility (SMF) records pertaining to jobs and processes running on a mainframe system. The SMF records are immediately available for processing after collection. The SMF records are collected from an SMF exit point and/or log stream.
Abstract:
Determining suspected root causes of anomalous network behavior includes identifying anomalous components in a network exhibiting anomalous behavior from a plurality of network components, assigning a likelihood score to network components based on a scoring policy that considers recent change events affecting the anomalous components, and identifying a subset of the network components that are suspected to be root causes based on the likelihood score.
Abstract:
Various embodiments of the present invention that include receive a signal indicating a loss of power, start a timer, the timer configured to expire after a specific time period, copy write cache data from the volatile memory to a solid state device (SSD), upon receiving the signal indicating the loss of power to the storage system, configure the SSD as both a read cache and the write cache, perform a health test on the storage system, determine the loss of power as a false alarm if the timer expires and the storage system passes a health test on the storage system upon receiving the signal indicating the loss of power, and upon the timer expiring and the storage system passing the health test, copy the write cache data from the SSD back to the volatile memory.
Abstract:
The specification discloses a method of doing business over the public Internet, particularly, a method which enables access to legacy management tools used by a telecommunications enterprise in the management of the enterprise business to the enterprise customer, to enable the customer to more effectively manage the business conducted by the customer through the enterprise, this access being provided over the public Internet. This method of doing business is accomplished with one or more secure web servers which manage one or more secure client sessions over the Internet, each web server supporting secure communications with the client workstation; a web page backplane application capable of launching one or more management tool applications used by the enterprise. Each of the management tool applications provide a customer interface integrated within said web page which enables interactive Web/Internet based communications with the web servers; each web server, supports communication of messages entered via the integrated customer interface to one or more remote enterprise management tool application servers which interact with the enterprise management tool applications to provide associated management capabilities to the customer.