摘要:
A method may include sending, by a client device, an access request to an authentication server device. The access request may include a request to access an administered resource. The method may include in response to the client device not complying with an administrative policy associated with the administered resource, receiving, from the authentication server device, one or more instructions regarding installation of a client application, receiving, by the client device, a client application in accordance with the instructions, and installing the client application on the client device.
摘要:
A method may include sending, by a client device, an access request to an authentication server device. The access request may include a request to access an administered resource. The method may include in response to the client device not complying with an administrative policy associated with the administered resource, receiving, from the authentication server device, one or more instructions regarding installation of a client application, receiving, by the client device, a client application in accordance with the instructions, and installing the client application on the client device.
摘要:
Apparatus and methods of a remote control device are provided. The remote control device includes a switch and a power input. The remote control device also includes a touch panel configured to operate in an absence of backlight. The touch panel is configured to receive a first input at a first area of the touch panel and a second input at a second area of the touch panel. The remote control device includes a processing unit configured to provide first control data representing the first input and second control data representing the second input. The first control data can control movement of a cursor on the electronic device. The second control data can identify text corresponding to the second input. The remote control device includes a transmitter configured to provide the control data to the electronic device.
摘要:
In one example, a device executes one or more video communication processes that receive audio streams and video streams from a plurality of computing devices participating in a video communication session associated with the one or more video communication processes. The device evaluates one or more properties of the audio streams, including the volume of an audio signal among the audio streams. The device selects a first group of the audio streams to mute in the video communication session, based at least in part on the one or more properties of the audio streams. The device distributes a second group of the audio streams in the video communication session, while muting the first group of audio streams in the video communication session.
摘要:
Embodiments herein present a method, system, computer program product, etc. for automated management using a hybrid of prediction models and feedback-based systems. The method begins by calculating confidence values of models. Next, the method selects a first model based on the confidence values and processes the first model through a constraint solver to produce first workload throttling values. Following this, workloads are repeatedly processed through a feedback-based execution engine, wherein the feedback-based execution engine is controlled by the first workload throttling values. The first workload throttling values are applied incrementally to the feedback-based execution engine, during repetitions of the processing of the workloads, with a step-size that is proportional to the confidence values. The processing of the workloads is repeated until an objective function is maximized, wherein the objective function specifies performance goals of the workloads.
摘要:
Disclosed is a storage management framework that integrates corrective action plans output from multiple different types of planning tools, sorts the different corrective action plans based on utility and risk values and outputs a time-based schedule for implementing one or more of the corrective action plans to resolve identified current and anticipated workload service level objective (SLO) violations.
摘要:
A system comprises a finding scene constructing module, for constructing and displaying a finding scene according to a scene of different levels of difficulty, a base map matching the scene and a target to be found; a finding position processing module, for acquiring a finding position and comparing the finding position with a distribution area of the target to be found, to obtain a comparison result and judge, according to the comparison result, whether a child accurately finds the target to be found; a scoring module, for scoring according to the comparison result, counting total scores and submitting the total scores to a database for storage; an audio and video module, for providing prompts and knowledge for the child according to the comparison result; and a scene element database, for storing the scene of different levels of difficulty, the base map matching the scene, the target, and the audio and video.
摘要:
The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted.
摘要:
The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted.
摘要:
Embodiments herein present a method, system, computer program product, etc. for automated management using a hybrid of prediction models and feedback-based systems. The method begins by calculating confidence values of models. Next, the method selects a first model based on the confidence values and processes the first model through a constraint solver to produce first workload throttling values. Following this, workloads are repeatedly processed through a feedback-based execution engine, wherein the feedback-based execution engine is controlled by the first workload throttling values. The first workload throttling values are applied incrementally to the feedback-based execution engine, during repetitions of the processing of the workloads, with a step-size that is proportional to the confidence values. The processing of the workloads is repeated until an objective function is maximized, wherein the objective function specifies performance goals of the workloads.