-
公开(公告)号:US10997288B2
公开(公告)日:2021-05-04
申请号:US15933929
申请日:2018-03-23
摘要: Detecting a compromised system using an integrated management controller including receiving a workload characterization for an expected hardware utilization of a computing system, wherein the workload characterization is a pattern of expected hardware utilization of computing hardware on the computing system, and wherein the workload characterization comprises hardware utilization thresholds; storing the workload characterization on an integrated management controller communicatively coupled to the computing hardware on the computing system; monitoring the computing hardware of the computing system using the integrated management controller, including comparing the hardware utilization thresholds of the workload characterization to measured hardware utilization of the computing hardware; determining that the computing system is compromised based on detecting that the measured hardware utilization of the computing hardware has exceeded one of the hardware utilization thresholds of the workload characterization; and performing a notification action in response to determining that the computing system is compromised.
-
公开(公告)号:US10764321B2
公开(公告)日:2020-09-01
申请号:US15079160
申请日:2016-03-24
发明人: Fred Allison Bower, III , Gary David Cudak , Ajay Dholakia , William Gavin Holland , Scott Kelso
摘要: Methods and systems of identifying and remediating at-risk resources in a computing environment are provided. A method includes periodically determining respective infrastructure topologies of a computing environment that changes over time, wherein the determining is performed by a computer system communicating with the computing environment. The method also includes: identifying, by the computer system, an intrusion event in the computing environment; determining, by the computer system, at-risk resources in the computing environment based on the determined intrusion event and a corresponding one of the infrastructure topologies; and performing, by the computer system, remediation action for the at-risk resources.
-
公开(公告)号:US10185379B2
公开(公告)日:2019-01-22
申请号:US15088086
申请日:2016-03-31
发明人: Paul Artman , Fred A. Bower , Gary D. Cudak , Ajay Dholakia
摘要: Systems and methods for usage of secondary power supplies in computing environments based on risk and cost assessments are disclosed. According to an aspect, a method includes determining a risk value to a primary power source of a need to utilize a secondary power source for powering a plurality of computing devices. The method includes using the secondary power source to power a portion of the computing devices based on the determined risk value.
-
公开(公告)号:US20180373613A1
公开(公告)日:2018-12-27
申请号:US15632301
申请日:2017-06-24
IPC分类号: G06F11/34 , G06F3/0481 , G06F9/44 , G06F17/30
摘要: Systems and methods for dynamic user gesture creation are disclosed. According to an aspect, a method includes analyzing, by the processor, a set of inputs of a user into a computing device to achieve a result on the computing device. The method also includes determining, by the processor, whether an efficiency threshold is met if the user utilizes another input to achieve the result rather than the set of inputs. Further, the method includes presenting the other input to the user as an alternative input for achieving the result on the computing device in response to determining that the efficiency threshold is met.
-
公开(公告)号:US10114653B2
公开(公告)日:2018-10-30
申请号:US15178076
申请日:2016-06-09
IPC分类号: G06F9/44 , G06F9/4401 , G06F8/65 , H04L29/08 , G06F8/654
摘要: At power on of a computing device, a baseboard management controller (BMC) of the computing device executes, a first-stage bootloader program to download a second-stage bootloader program from a first server. The BMC executes the second-stage bootloader program to download third-stage firmware of the BMC from a second server. The BMC executes the third-stage firmware to download firmware of a primary processing subsystem of the computing device from a third server, and to start the primary processing subsystem by causing the primary processing subsystem to execute the firmware of the primary processing subsystem.
-
公开(公告)号:US20170351715A1
公开(公告)日:2017-12-07
申请号:US15169845
申请日:2016-06-01
CPC分类号: G06F16/21 , G06F11/14 , G06F16/24578
摘要: A method is provided for obtaining and using a measure of data importance. The method include measuring a data production resource metric for a data set. The method further includes storing the data production resource metric in association with the data set, assigning an importance identifier to the data set as a function of the data production resource metric, and managing system handling of the data set according to the importance identifier assigned to the data set. For example, system handling of the data set may include processing the data set with an application selected from de-duplication, backup, redundancy routines, and tiering.
-
公开(公告)号:US20240004440A1
公开(公告)日:2024-01-04
申请号:US17855797
申请日:2022-07-01
发明人: Gary D. Cudak , Vinod Kamath , Ajay Dholakia , Miroslav Hodak
IPC分类号: G06F1/20 , G05B19/4155
CPC分类号: G06F1/206 , G05B19/4155 , G05B2219/49216
摘要: A computer-implemented method includes identifying a plurality of adapter modules of a particular adapter module type that are installed in a plurality of slots of a single host computer, and identifying, for each of the identified adapter modules, a slot of the plurality of slots in which the adapter module is installed. The method may further includes accessing, for each identified slot, a predetermined relative thermal efficiency value for operation of an adapter module of the particular adapter module type in a particular slot, and controlling, for one or more of the identified adapter modules, the operation of the identified adapter module based on the predetermined relative thermal efficiency value for the slot in which the identified adapter module is installed. A computer program product may also include program instructions that are executable by a processor to cause the processor to perform the method.
-
公开(公告)号:US10944839B2
公开(公告)日:2021-03-09
申请号:US15053268
申请日:2016-02-25
摘要: Conveying potential communication methods for a user of a computing system network, including: determining whether a user account for a real-time communications application (RTCA) is installed on a first inactive user device; if the user account for the RTCA is installed on the first inactive user device: calculating a proximity between a location of the first inactive user device and a user location; determining a status for the RTCA account based on the proximity between the location of the first inactive user device and the user location, wherein the status indicates a user's potential availability to utilize the RTCA account for communications; and sending the status for the RTCA account to another device.
-
公开(公告)号:US10552600B2
公开(公告)日:2020-02-04
申请号:US15342022
申请日:2016-11-02
摘要: In one embodiment, a system includes a media storage device, a processor, and logic integrated with and/or executable by the processor. The logic is configured to cause the processor to associate a first subset of storage space on the media storage device with a first group of applications executing on a hardware processor. The logic is also configured to cause the processor to receive a request from an application to access the first subset of storage space on the media storage device. Moreover, the logic is configured to cause the processor to prevent any application other than an application from the first group of applications from accessing the first subset of storage space on the media storage device. Other systems, methods, and computer program products for defending against ransomware attacks on devices and systems using application authority assignment are described according to more embodiments.
-
10.
公开(公告)号:US20180129541A1
公开(公告)日:2018-05-10
申请号:US15348969
申请日:2016-11-10
摘要: Systems and methods for determining placement of computing workloads within a network are disclosed. According to an aspect, a method includes determining one or more attributes of a computing workload to be placed within a network. The method also includes predicting interaction of the computing workload with one or more other computing workloads within the network based on the one or more attributes. Further, the method includes determining placement of the computing workload within the network based on the predicted interaction and a topology of the network.
-
-
-
-
-
-
-
-
-