Detecting a compromised system using an integrated management controller

    公开(公告)号:US10997288B2

    公开(公告)日:2021-05-04

    申请号:US15933929

    申请日:2018-03-23

    IPC分类号: G06F21/55 G06F21/56

    摘要: Detecting a compromised system using an integrated management controller including receiving a workload characterization for an expected hardware utilization of a computing system, wherein the workload characterization is a pattern of expected hardware utilization of computing hardware on the computing system, and wherein the workload characterization comprises hardware utilization thresholds; storing the workload characterization on an integrated management controller communicatively coupled to the computing hardware on the computing system; monitoring the computing hardware of the computing system using the integrated management controller, including comparing the hardware utilization thresholds of the workload characterization to measured hardware utilization of the computing hardware; determining that the computing system is compromised based on detecting that the measured hardware utilization of the computing hardware has exceeded one of the hardware utilization thresholds of the workload characterization; and performing a notification action in response to determining that the computing system is compromised.

    DETERMINING AN IMPORTANCE CHARACTERISTIC FOR A DATA SET

    公开(公告)号:US20170351715A1

    公开(公告)日:2017-12-07

    申请号:US15169845

    申请日:2016-06-01

    IPC分类号: G06F17/30 G06F3/06

    摘要: A method is provided for obtaining and using a measure of data importance. The method include measuring a data production resource metric for a data set. The method further includes storing the data production resource metric in association with the data set, assigning an importance identifier to the data set as a function of the data production resource metric, and managing system handling of the data set according to the importance identifier assigned to the data set. For example, system handling of the data set may include processing the data set with an application selected from de-duplication, backup, redundancy routines, and tiering.

    RELATIVE THERMAL EFFICIENCY VALUES FOR CONTROLLING OPERATION OF ADAPTER MODULES

    公开(公告)号:US20240004440A1

    公开(公告)日:2024-01-04

    申请号:US17855797

    申请日:2022-07-01

    IPC分类号: G06F1/20 G05B19/4155

    摘要: A computer-implemented method includes identifying a plurality of adapter modules of a particular adapter module type that are installed in a plurality of slots of a single host computer, and identifying, for each of the identified adapter modules, a slot of the plurality of slots in which the adapter module is installed. The method may further includes accessing, for each identified slot, a predetermined relative thermal efficiency value for operation of an adapter module of the particular adapter module type in a particular slot, and controlling, for one or more of the identified adapter modules, the operation of the identified adapter module based on the predetermined relative thermal efficiency value for the slot in which the identified adapter module is installed. A computer program product may also include program instructions that are executable by a processor to cause the processor to perform the method.

    Securing a media storage device using application authority assignment

    公开(公告)号:US10552600B2

    公开(公告)日:2020-02-04

    申请号:US15342022

    申请日:2016-11-02

    IPC分类号: G06F21/44 G06F21/51

    摘要: In one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to associate a first subset of storage space on the media storage device with a first group of applications executing on a hardware processor. The logic is also configured to cause the processor to receive a request from an application to access the first subset of storage space on the media storage device. Moreover, the logic is configured to cause the processor to prevent any application other than an application from the first group of applications from accessing the first subset of storage space on the media storage device. Other systems, methods, and computer program products for defending against ransomware attacks on devices and systems using application authority assignment are described according to more embodiments.