摘要:
In some examples, a software agent may request a token from a server. The request may include dock identifiers associated with one or more docks, credentials, and actions to be performed by the one or more docks. The server may determine, using an access control list, whether the credentials authorize the software agent to instruct the one or more docks to perform the actions. If the server determines that the software agent is authorized, then the server may send a token to the software agent. The software agent may send an action request to the one or more docks. The action request may include the token and the actions. Each dock that receives the request may attempt to validate the token. If the dock successfully validates the token, the dock may perform the actions and send a message to the software agent indicating a result of performing the actions.
摘要:
A system of one or more computers is configured to peer container clusters running on different container orchestration systems. One general aspect includes moving an endpoint service container between an original cluster and a target cluster of a cluster mesh. In at least one embodiment, a remote service endpoint container is instantiated at the original cluster using service registry information accessed by a mesh operator. In at least one embodiment, the service registry information includes the hostname/path information for the endpoint service container operating at the target cluster. The remote service endpoint container is configured to allow the dependent container at the original cluster to consume services available at the endpoint service container at the target cluster as though the endpoint service container is local to the dependent container.
摘要:
Methods and systems are disclosed that include receiving problem information from a user interface at a resolution identification system, receiving product information at the resolution identification system, and performing machine learning analysis of the problem information and the product information. The machine learning analysis produces one or more model outputs, and is performed by a machine learning system of the resolution identification system, using one or more machine learning models. Each of the one or more machine learning models produces a corresponding one of the one or more model outputs. Such a method can further include generating resolution information by performing an action identification operation using the one or more model outputs, and outputting the resolution information from the resolution identification system. The resolution information is output to the user interface.
摘要:
Various systems and methods are provided for using a response tracking plugin to detect and inform users in real time when one or more recipients of an email are actively responding to that email. In one embodiment, the functionality disclosed herein can be applied to an email that was sent to a plurality of recipients, including at least a first and second recipient, and where the email comprises a plugin that is configured to enable response tracking. One such embodiment comprises receiving the email; monitoring for a first pulse from the second recipient of the email, where the pulse is configured to indicate that the second recipient of the email has begun a reply to the email; and in response to receiving the first pulse, displaying an indication that comprises information about the second recipient of the email.
摘要:
A server may receive a device profile from a computing device. The device profile may identify a usage of at least software applications associated with the computing device. The server may perform a comparison of the device profile with other device profiles associated with other computing devices, determine a similarity index of the device profile with individual ones of the other device profiles, and select a subset of the other device profiles based on the similarity index to create a set of similar device profiles. The server may determine configuration differences between the device profile of the computing device and individual device profiles of the similar device profiles, determine recommendations based on the configuration differences, and send the recommendations to the computing device. Implementing one or more of the recommendations may cause the one or more tasks to execute faster or use less of one or more computing resources.
摘要:
In some examples, a computing device may initiate a chat session with a software agent on a server. During the chat session, the software agent may ask questions and receive answers in response. The server may process logs sent from the computing device and a transcript of the chat session to identify tokens. A supervised learning model on the server may select a script based on the tokens and send the script to the computing device. The computing device may store the script in non-volatile memory and boot into a setup state of a basic input output system (BIOS) of the computing device. The BIOS may retrieve the script, convert BIOS procedure calls in the script into an action tree, and execute the actions in the action tree, causing a virtual mouse and/or virtual keyboard to provide input to the BIOS to modify the BIOS to address an issue.
摘要:
In some examples, a computing device may predict, using a machine learning module, scenarios and transactions associated with a usage of a software package. The computing device may select at least a portion of the scenarios and the transactions to cover a predetermined percentage of a predicted usage of the software package. The computing device may select a subset of unit test cases (e.g., created by software designers to test software units that are components of the software package) and execute the test cases to generate test results to determine whether the software package is ready to be deployed to customers. The computing device may train the machine learning module using at least one of the test results, the portion of the scenarios and the transactions, or the test cases. The test results may be evaluated to determine an effectiveness of the set of test cases.
摘要:
In some implementations, a computing device includes a first housing coupled to a second housing by hinges. The first housing includes a first display device and a first set of components. The second housing includes a second display device and a second set of components. The hinges include (1) leaves coupling the first housing to the second housing, (2) knuckles to position the first housing at an angle between about 0 degrees to about 180 degrees relative to the second housing, and (3) conduits through which cables are routed between the first housing and the second housing. At about 180 degrees, the first housing is adjacent and sufficiently close to the second housing that the first and second display device provide a nearly contiguous surface. The cables communicate signals between the first set of components in the first housing and the second set of components in the second housing.
摘要:
Systems and methods for reducing problems and disadvantages associate with remotely booting multiple information handling systems are disclosed. A method may include obtaining system-specific parameters regarding a system including a plurality of remotely-booted clients, the system-specific parameters including a average client boot time threshold. The method may also include generating a plurality of client boot threads based on at least one or more of the system-specific parameters. The method may additionally include measuring an actual average client boot time of the plurality of client boot threads. The method may further include determining a number of remotely-booted clients for substantially simultaneous remote booting based on at least the actual average client boot time and the average client boot time threshold.
摘要:
A method is provided for managing errors in a virtualized information handling system that includes an error detection system and a hypervisor allowing multiple virtual machines to run on the information handling system. The hypervisor may assign at least one memory region to each of multiple virtual machines. The error detection system may detect an error, determine a physical memory address associated with the error, and report that address to the hypervisor. Additionally, the hypervisor may determine whether the memory region assigned to each virtual machine includes the physical memory address associated with the error. The hypervisor may shut down each virtual machine for which a memory region assigned to that virtual machine includes the physical memory address associated with the error, and not shut down each virtual machine for which the memory regions assigned to that virtual machine do not include the physical memory address associated with the error.