摘要:
A method for capturing an image of a machine having one or more disks is presented. The method comprises creating a snapshot of the machine, the snapshot including full machine encapsulation, querying the one or more disks on the machine to obtain information stored thereon, creating metadata able to access one or more files, one or more folders, and the application on the machine, and capturing the snapshot, the obtained information and the metadata in the image. The method may also comprise migrating the captured image and/or extracting one or more files and/or folders from the captured image on another machine. The migration can be between physical and physical, physical and virtual, physical and cloud, etc. The method may comprise capturing another image comprising the snapshot, the metadata and changed information different from the obtained information.
摘要:
A method for capturing an image of a machine having one or more disks is presented. The method comprises creating a snapshot of the machine, the snapshot including full machine encapsulation, querying the one or more disks on the machine to obtain information stored thereon, creating metadata able to access one or more files, one or more folders, and the application on the machine, and capturing the snapshot, the obtained information and the metadata in the image. The method may also comprise migrating the captured image and/or extracting one or more files and/or folders from the captured image on another machine. The migration can be between physical and physical, physical and virtual, physical and cloud, etc. The method may comprise capturing another image comprising the snapshot, the metadata and changed information different from the obtained information.
摘要:
Systems and methods may include receiving first data of components, which may represent performance characteristics of the components at a first time. The systems and methods may include performing a first cluster analysis of the first data to identify clusters of the components with similar characteristics. The systems and methods may include receiving second data of the components, which may represent performance characteristics of the components at a second time. The systems and methods may include performing a second cluster analysis of the second data to identify clusters of the components with similar characteristics. The systems and methods may include determining whether a component transitioned from a cluster identified in the first cluster analysis to a different cluster identified in the second cluster analysis. The systems and methods may include determining that an anomaly occurred in response to determining that the component transitioned from the cluster to the different cluster.
摘要:
A method, performed in a character entry system, for interrelating character strings so that an incomplete input character string can be completed by selection of a presented character string involves computing relationship scores for individual character strings in the system from documents present in the character entry system, in response to inputting of a string of individual characters that exceeds a specified threshold, identifying at least one selectable character string from among contextual associations that can complete the input character string in context based upon an overall ranking score computed as a function of at least two other scores, and providing the identified at least one selectable character string to a user for selection.
摘要:
A method performed in a system having multiple navigable nodes interconnected in a hierarchical arrangement involves receiving an input containing at least one word identifiable with at least one keyword, identifying at least one node, other than the first node, not directly connected to the first node, but associated with the at least one keyword, and jumping to the identified node. A transaction processing system having a hierarchical arrangement of nodes and is configured for user navigation among the nodes. The system has an inverted index correlating keywords with at least some nodes in the arrangement so that when the user provides an input in response to a verbal description and the response includes a meaningful word correlatable with a keyword, the system will identify at least one node correlated to the meaningful word by the inverted index and jump to that node without first traversing any other node.
摘要:
Systems and methods may include receiving real-time data about a real component operating in a real-world environment. The systems and methods may further include generating a virtual representation of the real component based on the real-time data about the real component and historical data associated with the real component. In addition, the systems and methods may include receiving injected data from a lab. The injected data may provide data about a lab component operating in the lab. The systems and methods may also include simulating, in a virtual environment, a real-time interaction in the real-world environment between the real component and the lab component using the virtual representation of the real component and the injected data. Moreover, the systems and methods may include determining a real-time performance characteristic of at least one of the lab component and the real component based on the simulated real-time interaction in the real-world environment.
摘要:
A computer implemented method includes monitoring blocks of data on a storage device that are changing as the computer operates. On detecting a computer shut down event, a copy of changes to the monitored blocks are saved. Upon startup of the computer, a backup of the changed blocks of data is performed.
摘要:
Systems and methods may include receiving first and second motion data about first and second objects, respectively. The systems and methods may include applying an asymmetric correlation rule (ACR) to the first and second motion data. The ACR may define a baseline state of motion for the first object and a correlation relationship between the first and second objects. The systems and methods may include determining whether the first object is in the baseline state and, in response to determining that the first object is not in the baseline state, determining whether a first motion vector of the first object is sufficiently correlated with a second motion vector of the second object. The systems and methods may include, in response to determining both that the first object is not in the baseline state and that the first and second motion vectors are not sufficiently correlated, generating an anomalous behavior notification.
摘要:
A computer implemented method includes creating a child disk for a machine. A configuration of a backed up disk drive is derived from a storage container that includes a block level backup copy of the disk drive. The child disk is populated with selected data from blocks of data corresponding to selected files desired to be used on the machine. Drivers may be injected and registries modified to start with booting of the virtual.
摘要:
A computer implemented method includes creating a child disk for a machine. A configuration of a backed up disk drive is derived from a storage container that includes a block level backup copy of the disk drive. The child disk is populated with selected data from blocks of data corresponding to selected files desired to be used on the machine. Drivers may be injected and registries modified to start with booting of the virtual.