摘要:
Systems and methods may include receiving first and second motion data about first and second objects, respectively. The systems and methods may include applying an asymmetric correlation rule (ACR) to the first and second motion data. The ACR may define a baseline state of motion for the first object and a correlation relationship between the first and second objects. The systems and methods may include determining whether the first object is in the baseline state and, in response to determining that the first object is not in the baseline state, determining whether a first motion vector of the first object is sufficiently correlated with a second motion vector of the second object. The systems and methods may include, in response to determining both that the first object is not in the baseline state and that the first and second motion vectors are not sufficiently correlated, generating an anomalous behavior notification.
摘要:
A method includes determining a convergence point for a first object and a second object from position data, capability data, and environment data that are all associated with the first and second object, wherein the convergence point is determined in accordance with a policy. The method also includes determining a first amount of time for the first object to reach the convergence point based on the position data, the capability data, and the environment data. The method still further includes determining a second amount of time for the second object to reach the convergence point based on the position data, the capability data, and the environment data. The method additionally includes determining an estimated amount of time to convergence between the first object and the second object, and transmitting the estimated amount of time to convergence to one or more of the first and second object.
摘要:
A method includes applying a correlation rule defining a correlation relationship between a first and second object and determining, using a processor, whether a first motion vector of the first object is correlated at a threshold level of correlation with a second motion vector of the second object, the correlation relationship between the first and second objects identifying the threshold level of correlation between the first and second motion vectors. The method also includes, in response to determining that the first motion vector is not correlated at the threshold level with the second motion vector, determining a convergence point for the first and second objects in accordance with a policy. The method further includes transmitting instructions for arriving at the convergence point to the first and second objects.
摘要:
A method includes applying a correlation rule defining a correlation relationship between a first and second object and determining, using a processor, whether a first motion vector of the first object is correlated at a threshold level of correlation with a second motion vector of the second object, the correlation relationship between the first and second objects identifying the threshold level of correlation between the first and second motion vectors. The method also includes, in response to determining that the first motion vector is not correlated at the threshold level with the second motion vector, determining a convergence point for the first and second objects in accordance with a policy. The method further includes transmitting instructions for arriving at the convergence point to the first and second objects.
摘要:
Systems and methods may include receiving first motion data corresponding to a first object and receiving second motion data corresponding to a second object. The systems and methods may include determining whether the second object is following the first object based on the first motion data and the second motion data. The systems and methods may include receiving additional information corresponding to the second object. The systems and methods may include determining whether the second object poses a risk to the first object based on the additional information. The systems and methods may include performing processes in response to determining that the second object is following the first object and poses a risk to the first object. Such processes may include providing a notification to a subscribing party. The notification may indicate that the second object is following the first object and poses a risk to the first object.
摘要:
Systems and methods may include receiving, by an expert system, performance data for a monitored system. The systems and methods may include generating a prediction for the monitored system in response to determining that the performance data satisfies a condition. The prediction may identify an anomaly that is predicted to occur. The systems and methods may include receiving, by a filter system, the prediction, information identifying the condition, and user information. The user information may include user preference information and user feedback information. The systems and methods may include determining a filter criteria based on the user information. The filter criteria may be based on the preferences for predictions to be provided to the user and on the historical user feedback regarding the historical predictions. The systems and methods may include providing the prediction to the user in response to determining that the particular prediction satisfies the filter criteria.
摘要:
A system and method for visualization of an infrastructure is presented. The system comprises a non-relational graph data store caching data from one or more of a relational or non-relational data store, a graph visualization software operable to perform the visualization of the infrastructure using the cached data in the non-relational graph data store, and a graph database operable to implement analytic queries available to the graph visualization software through an exposed Application Program Interface. In one aspect, the graph database collects the cached data from the one or more relational or non-relational graph data stores. In one aspect, the cached data comprises nodes representing elements of the infrastructure, and links representing relationships among the nodes. In one aspect, the infrastructure is an IT infrastructure.
摘要:
A system and method for modifying execution scripts associated with a job scheduler may include monitoring for the execution of a task to determine when the task has failed. Details of the failed task may be identified and used to attempt recovery from the task failure. After initiating any recovery tasks, execution of the recovery tasks may be monitored, and one or more supplementary recovery tasks may be identified and executed, or the original task may be rerun at an appropriate execution point based on the initial point of failure. Thus, when a task has failed, an iterative process may begin where various effects of the failed task are attempted to be rolled back, and depending on the success of the rollback, the initial task can be rerun at the point of failure, or further recovery tasks may be executed.
摘要:
A web based help desk includes a web server having memory storing a help desk web page. The web server allows remote user computers to access the web server via an internet or intranet connection thereby to access and display the help desk web page. A plurality of computers, operated by support specialists, are in communication with the web server to allow support specialists to communicate with remote users requiring support. The support specialists are selectable through the web page. A support specialist status application monitors the status of the support specialists and remote users requesting support and prompts the web server to establish a connection between a support specialist and a remote user when a support specialist becomes available. A method of providing support to a user operating a remote computer and a help desk web page are also provided.
摘要:
Consistency and/or completeness of access control policy sets may be validated and/or verified. An access control policy set may be received. The access control policy set may include access control policies that allow or disallow access to computing resources. Individual ones of the access control policies may include one or more attributes. The one or more attributes of a given access control policy may be ordered into a predetermined order responsive to the one or more attributes of the given access control policy lacking the predetermined order. A decision tree may be generated based on the access control policies. The decision tree may be analyzed to determine one or more of (1) whether one or more of the access control policies are incomplete, or (2) whether one or more of the access control policies are inconsistent with one or more other ones of the access control policies.