IT monitoring recommendation service

    公开(公告)号:US11743139B2

    公开(公告)日:2023-08-29

    申请号:US17537387

    申请日:2021-11-29

    CPC classification number: H04L41/5009 G06N20/00 H04L41/16

    Abstract: Operational metrics of a distributed collection of servers in a cloud environment are analyzed by a service to intelligently machine learn which operational metric is highly correlated to incidents or failures in the cloud environment. To do so, metric values of the operational metrics are analyzed over time by the service to check whether the operation metrics exceed a particular metric threshold. If so, the service also checks whether such spikes in the operation metric above the metric thresholds occurred during known cloud incidents. Statistics are calculated reflecting the number of times the operational metrics spiked during times of cloud incidents and spiked during times without cloud incidents. Correlation scores based on these statistics are calculated and used to select the correlated operational metrics that are most correlated to cloud failures.

    AUTOMATIC TUNING OF INCIDENT NOISE
    14.
    发明申请

    公开(公告)号:US20210366268A1

    公开(公告)日:2021-11-25

    申请号:US16880573

    申请日:2020-05-21

    Abstract: Methods, systems, and computer program products are provided for identifying configuration parameters for generating issues in a computing environment. A data retriever is configured to retrieve, from a data store, past incident data relating to past alerts in the computing environment. A configuration optimizer generates a configuration change based at least on an evaluation of the past incident data. For instance, the configuration change can be a recommended change to one or more configuration settings of a monitoring system and/or an incident management system. An incident volume change is predicted under an assumption the configuration change is implemented. Based at least on the incident volume change, the configuration change can be provided for implementation on an alerting system.

    Efficient incident management in large scale computer systems

    公开(公告)号:US11003960B2

    公开(公告)日:2021-05-11

    申请号:US15990179

    申请日:2018-05-25

    Inventor: Navendu Jain

    Abstract: Computing systems for efficient incident management in large scale computer systems are described herein. In one embodiment, an incident management system can be configured to, in response to receiving a user input requesting an unidentified incident management service, convert an alphanumerical string of the user input into a pixelated matrix having multiple pixels individually corresponding to a character or number in the alphanumerical string. The incident management system can then feed the converted pixelated matrix into a neural network to identify one or more incident management services corresponding to the received user input with a corresponding probability value. The incident management system can then perform an application programming interface (API) call to execute a computer application to provide one of the identified incident management services to the user.

    Hybrid hardware-software distributed threat analysis

    公开(公告)号:US10735379B2

    公开(公告)日:2020-08-04

    申请号:US16111141

    申请日:2018-08-23

    Abstract: Embodiments relate to detecting and mitigating network intrusions. Packets are inspected at their source/destination hosts to identify packet trends local to the hosts. The local packet trends are combined to identify network-wide packet trends. The network-wide packet trends are used to detect anomalies or attacks, which in turn informs mitigation actions. The local inspection may be performed by reconfigurable/reprogrammable “smart” network interfaces (NICs) at each of the hosts. Local inspection involves identifying potentially suspect packet features based on statistical prevalence of recurring commonalities among the packets; pre-defined threat patterns are not required. For network-wide coherence, each host/NIC uses the same packet-identifying and occurrence-measuring algorithms. An overlay or control server collects and combines the local occurrence-measures to derive the network-wide occurrence-measures. The network-wide occurrences can be used to automatically detect and mitigate completely new types of attack packets.

    Knowledge base for analysis of text

    公开(公告)号:US10679008B2

    公开(公告)日:2020-06-09

    申请号:US15487960

    申请日:2017-04-14

    Abstract: A knowledge base can include a dictionary associated with classes of a model, e.g., an ontology. A text segment that is not found in the dictionary can be received. Feature(s) can be determined for the text segment and, based partly on providing the feature(s) to a classifier, a set of values can be determined. The distribution can include values respectively corresponding to the classes. One of the values can be greater than a predetermined threshold. That value can correspond to a class. An indication identifying the class can be presented via a user interface having functionality to provide input that the text segment is associated with the class, is not associated with the class, or is associated with another class. Based at least partly on adding a new class to the ontology, a precedence table indicating priorities between motifs defining relationships between classes of the ontology can be updated.

    Characteristic-pattern analysis of text

    公开(公告)号:US10354009B2

    公开(公告)日:2019-07-16

    申请号:US15245675

    申请日:2016-08-24

    Abstract: A computing device can receive at least one document including text segments. The computing device can determine a characteristic pattern associated with a first text segment of the text segments and determine an association between the first text segment and a first individual class of a model based at least in part on the characteristic pattern. The computing device can determine a collection of classes of the model associated with the at least one document based at least in part on the association, and determine an actionable item associated with the at least one document based at least in part on the collection and at least one grammar pattern. The computing device can present or transmit an indication of the actionable item. In some examples, the computing device can arrange actionable items in an order based at least in part on occurrences of the actionable items from multiple documents.

Patent Agency Ranking