Abstract:
A method of operating a telemetry system includes automatically populating a first set of fields in a schema of an event definition using a logging library of the telemetry system, and populating a second set of fields in the schema selected by an event author.
Abstract:
A method of operating a telemetry system includes receiving an automatically populated set of fields in a schema of an event definition, and providing a response message in an application protocol. The set of fields are automatically populated using a logging library of the telemetry system.
Abstract:
La présente invention concerne un procédé et un système de surveillance de traitements par lots, dits batchs (BA), d'applications exécutées dans une infrastructure informatique (FW), le procédé étant mis en oeuvre par un logiciel de surveillance (LS) configuré pour la détection (60) d'au moins un incident (EC) de congestion des ressources informatiques de ladite infrastructure (FW) et pour l'identification (70) d'au moins un batch (BA) à l'origine dudit incident (EC), grâce aux étapes suivantes : • enregistrement (50) de la consommation habituelle (CM) desdites ressources par les batchs (BA); • suivi (51) de l'exécution des batchs (BA) au cours du temps ; • mesure (52), par un outil de surveillance (SU), de la consommation instantanée (CI) desdites ressources ; • comparaison (53), pour ladite identification (70), entre la consommation instantanée (CI) et la consommation habituelle (CM) de chacun des batchs (BA) exécutés pendant une période (PE) proche de l'incident (EC).
Abstract:
Usability of a cloud based service is recovered from a system failure. A customer transaction associated with the customer experience is executed to simulate the customer experience in the cloud based service. A failure associated with a subsystem the cloud based service is detected from an output of the customer transaction. A recovery action is determined to be associated with the failure. The recovery action is executed on the subsystem and monitored to determine a success status.
Abstract:
Embodiments of the invention provide a computer-implemented method of collecting computer user behavioural data during an interaction between a computer user and web-based content accessible via a computing device. A behavioural data collection activation script is provided, which may be provided within executable code of a webpage or media player executable on a webpage. The script runs during loading of the webpage or media player or upon execution of a specific operation or action within the webpage or media player. The script triggers activation of a data recording component on the computing device via a browser-based application programming interface (API), and triggers initiation of a behavioural data collection application on the computing device, which receives information from the data recording component as an input.
Abstract:
Malicious threat detection through time-series graph analysis, in which a data analysis device receives a data file comprising multiple log data entries. The log data entries include parameters associated with a computer network event in a computing network. The data analysis device produces a graphical model of the computing network based on at least one parameter included in the log data. The data analysis device also identifies a parameter associated with a node of the computer network represented by the graphical model, and performs a time-series analysis on the parameter. The data analysis device further determines, based on the time-series analysis on the parameter, at least one of an anomalous event associated with the computing network or a malicious event associated with the computing network.
Abstract:
Disclosed are systems and methods for ensuring fault tolerance of antivirus protection realized in a virtual environment. An example method includes collecting, by a antivirus agent in a virtual machine, information about available security virtual machines that provide at least one or more resource-intensive methods of antivirus checking of programs running on the virtual machine; analyzing the collected information to determine a location of the virtual machine relative to the security virtual machines and determine priorities for each of the security virtual machines based on the location of the virtual machine relative; forming a list of the available security virtual machines according to the priorities of the security virtual machines to identify a primary security virtual machine; connecting the virtual machine to the primary security virtual machine; and requesting the primary security virtual machine to perform at least antivirus checking of one or more programs running on the virtual machine.
Abstract:
The present invention discloses methods of archiving and optimizing lectures, presentations and other captured video for playback, particularly for blind and low vision individuals. A digital imaging device captures a preselected field of view that is subject to periodic change such as a whiteboard in a classroom. A sequence of frames is captured. Frames associated with additions or erasures to the whiteboard are identified. The Cartesian coordinates of the regions of these alterations within the frame are identified. When the presentation is played back, the regions that are altered are enlarged or masked to assist the low vision user. In another embodiment of the invention, the timing of the alterations segments the recorded audio into chapters so that the blind user can skip forward and backward to different sections of the presentation.
Abstract:
An instrumentation analysis system processes data streams by executing instructions specified using a data stream language program. The data stream language allows users to specify a search condition using a find block for identifying the set of data streams processed by the data stream language program. The set of identified data streams may change dynamically. The data stream language allows users to group data streams into sets of data streams based on distinct values of one or more metadata attributes associated with the input data streams. The data stream language allows users to specify a threshold block for determining whether data values of input data streams are outside boundaries specified using low/high thresholds. The elements of the set of data streams input to the threshold block can dynamically change. The low/high threshold values can be specified as data streams and can dynamically change.