-
公开(公告)号:US20240291429A1
公开(公告)日:2024-08-29
申请号:US18401803
申请日:2024-01-02
Applicant: Solaredge Technologies Ltd.
Inventor: Yury Kosharovsky , Sharon Haver , Yaron Binder , Lior Handelsman
IPC: H02S50/10 , G01R19/165 , G06F11/32 , H02S50/00
CPC classification number: H02S50/10 , G01R19/16528 , G01R19/16538 , G06F11/327 , H02S50/00 , Y02E10/50 , Y04S10/52
Abstract: A fault identification may be triggered by a component of a power generation system (PGS), such as a hardware component, a controller of a hardware component, a device of the PGS, a computer connected to the PGS, a computer configured to monitor the PGS, and/or the like. The fault identification may be the result of a failure of a component of the PGS, a future failure of a component of the PGS, a routine maintenance of the PGS, and/or the like. The fault is converted to a notification on a user interface using a mapping of faults, root-causes, notification rules, and/or the like. The conversion may use one or more lookup tables and/or formulas for determining the impact of the fault on the PGS, and/or the like.
-
公开(公告)号:US12066821B2
公开(公告)日:2024-08-20
申请号:US16904241
申请日:2020-06-17
Applicant: Rockwell Automation Technologies, Inc.
Inventor: Martin Dittmer , Li Li , Abhijeet Singh , Jens Meissner , Elaine M. Julius
CPC classification number: G05B23/027 , G06F11/3037 , G06F11/327 , H04L41/06 , H04L43/08 , H04L43/16
Abstract: Systems and methods for monitoring components of a manufacturing application system (e.g., MES or MOM) with respect to application-specific metrics is provided. The MES may include software or a computer system used to monitor, control, and log processes employed to transform raw materials to products in an industrial automation system. The industrial automation system may include a monitoring system that receive a first set of data associated with application-specific metrics corresponding to the manufacturing application system as well as a second set of data from components associated with the manufacturing application system. The monitoring system may store a third set of data, in which the second set of data is organized with respect to the first set of data in a database. The monitoring system may analyze the organized data with respect to boundary conditions and provide alerts to a user or adjust operations associated with the components or the manufacturing application systems based on the components operating outside of the boundary conditions.
-
公开(公告)号:US12056033B2
公开(公告)日:2024-08-06
申请号:US17760597
申请日:2019-09-25
Applicant: NIPPON TELEGRAPH AND TELEPHONE CORPORATION
Inventor: Shunsuke Kanai , Satoshi Suzuki , Haruhisa Nozue , Taisuke Yakawa , Naomi Murata , Fumika Asai
IPC: G06F11/00 , G06F9/54 , G06F11/07 , G06F11/30 , G06F11/32 , H04L41/0677 , H04L41/0604 , H04L41/12
CPC classification number: G06F11/327 , G06F9/542 , G06F11/0709 , G06F11/0781 , G06F11/3006 , G06F11/3072 , H04L41/0677 , G06F2201/86 , H04L41/0604 , H04L41/12
Abstract: An aspect of the present disclosure acquires topology information representing a connection configuration between a plurality of apparatuses constituting a communication network and event information representing occurrence statuses of an event by the plurality of apparatuses, estimates, based on the topology information and the event information, a first apparatus corresponding to a failure factor location from among the plurality of apparatuses, estimates, based on an occurrence status of the event by a second apparatus whose connection relationship with the first apparatus estimated is defined by the topology information, whether an occurrence of the event by the second apparatus is caused by the failure factor location or by another anomaly, and estimates, based on a relationship between an occurrence status of the event by the first apparatus and an occurrence status of the event by a third apparatus whose connection relationship with the first apparatus is not defined by the topology information, whether an occurrence of the event by the third apparatus is caused by the failure factor location or by another anomaly.
-
公开(公告)号:US20240259404A1
公开(公告)日:2024-08-01
申请号:US18615543
申请日:2024-03-25
Applicant: Capsule8, Inc.
Inventor: Brandon M. Edwards
CPC classification number: H04L63/1416 , G06F11/0793 , G06F11/3093 , G06F11/327 , G06F11/3636 , G06F21/552 , G06F21/554 , G06F21/577 , H04L63/1425 , H04L63/1433 , G06F2221/034
Abstract: Information associated with a process is received. At least a portion of the received information is used to modify a Process Tree. Modifying the Process Tree includes at least one of: (1) adding a Tag to the Process Tree and (2) modifying a Tag in the Process Tree. An Alert is generated based at least in part in response to determining that a Strategy has been matched.
-
公开(公告)号:US12026044B2
公开(公告)日:2024-07-02
申请号:US18331283
申请日:2023-06-08
Applicant: Pure Storage, Inc.
Inventor: Ilir Iljazi
IPC: G06F11/00 , G06F3/06 , G06F11/07 , G06F11/10 , G06F11/14 , G06F11/20 , G06F11/30 , G06F11/32 , G06F13/40 , G06F13/42 , G06F30/20 , G06N3/04 , G06N3/084 , G06N3/10 , G06Q10/0631 , G06Q10/20 , H03M13/00 , H03M13/15 , H03M13/29 , H03M13/37 , H04L9/08 , H04L9/14 , H04L9/32 , H04L9/40
CPC classification number: G06F11/0781 , G06F3/0604 , G06F3/0605 , G06F3/0619 , G06F3/0623 , G06F3/0629 , G06F3/064 , G06F3/0644 , G06F3/0653 , G06F3/0659 , G06F11/0709 , G06F11/0727 , G06F11/0751 , G06F11/079 , G06F11/0793 , G06F11/1076 , G06F11/1451 , G06F11/2094 , G06F11/3034 , G06F11/3051 , G06F11/3055 , G06F11/327 , G06F13/4022 , G06F13/4282 , G06F30/20 , G06N3/04 , G06N3/084 , G06N3/10 , G06Q10/063116 , G06Q10/06316 , G06Q10/20 , H03M13/1515 , H03M13/2909 , H03M13/3761 , H03M13/616 , H04L9/0869 , H04L9/0894 , H04L9/14 , H04L9/3242 , H04L63/0428 , H04L63/061 , H04L63/101 , G06F3/067 , G06F2201/84
Abstract: A method for execution by a storage network begins by creating a plurality of vaults in memory addressable by the storage network, where a vault is a virtual memory block associated with a portion of storage network memory, and then determining dispersed storage error encoding parameters for each vault. The method then continues by creating a plurality of vault regions within each vault, wherein a vault region is configured to store a data type of a plurality of data types, where at least one data type of the plurality of data types is associated with a unique access restriction.
-
公开(公告)号:US12013774B2
公开(公告)日:2024-06-18
申请号:US17877528
申请日:2022-07-29
Applicant: Red Hat, Inc.
Inventor: Aaron Merey
CPC classification number: G06F11/366 , G06F11/327 , G06F11/3624
Abstract: Systems and methods for implementing a verification of core file debugging resources are disclosed. A plurality of mappings are created from a core file comprising a plurality of filenames and a plurality of target build identifiers (IDs). The core file corresponds to a computer program crash event and each one of the plurality of mappings map one of the plurality of filenames to a corresponding one of the plurality of target build IDs. Responsive to creating the plurality of mappings, a first file is located that corresponds to a first filename included in a first mapping from the plurality of mappings. The first comprises a first target build ID. A processing device utilizes the first file to analyze the computer program crash event in response to determining that the first file build ID matches the first target build ID.
-
公开(公告)号:US20240193649A1
公开(公告)日:2024-06-13
申请号:US18080441
申请日:2022-12-13
Applicant: International Business Machines Corporation
Inventor: Martin G. Keen , Zachary A. Silverstein , Melanie Dauber , John M. Ganci, JR.
CPC classification number: G06Q30/04 , G06F9/485 , G06F11/327
Abstract: By analyzing activity monitoring data, a task pattern comprising a set of one or more tasks is derived. The task pattern is identified as a candidate task pattern responsive to determining that a completion variability in the task pattern is above a threshold amount. By analyzing performance data of a system used in performing the candidate task pattern, an optimum time at which to perform the candidate task pattern is identified. Responsive to detecting commencement of performance, at a time earlier than the optimum time, the candidate task pattern is delayed. The candidate task pattern is performed at the optimum time.
-
公开(公告)号:US20240187423A1
公开(公告)日:2024-06-06
申请号:US18366195
申请日:2023-08-07
Applicant: Capsule8, Inc.
Inventor: Brandon M. Edwards
CPC classification number: H04L63/1416 , G06F11/0793 , G06F11/3093 , G06F11/327 , G06F11/3636 , G06F21/552 , G06F21/554 , G06F21/577 , H04L63/1425 , H04L63/1433 , G06F2221/034
Abstract: Telemetry associated with an Exec( ) Event denoting that a program has been invoked via a process is received. A determination is made that the process is a shell. Subsequent to determining that the invoked program is a shell, additional information comprising information that the program has attempted to obtain terminal information is received. Based at least in part on the received additional information, a determination is made that the program is an interactive shell. An action is taken in response to the determination that the program is an interactive shell.
-
公开(公告)号:US11989085B2
公开(公告)日:2024-05-21
申请号:US17656689
申请日:2022-03-28
Applicant: International Business Machines Corporation
Inventor: Melanie Dauber , Jaclyn Rudolf , Zachary A. Silverstein , Jeremy R. Fox
CPC classification number: G06F11/0793 , G06F8/65 , G06F11/3006 , G06F11/327
Abstract: In an approach for predicting an optimal system upgrade, a processor detects an upgrade is available for a system of a first user computing device. A processor gathers a set of live data from an environment of the first user computing device using a process mining software. A processor compares the set of live data to a set of historical data stored in a knowledge corpus to identify a second user computing device similar to the first user computing device. Responsive to identifying the second user computing device, a processor performs a pattern recognition to generate one or more critical recommendations associated with the upgrade for the system of the first user computing device. A processor schedules the upgrade for the system of the first user computing device during a period of time, wherein the period of time is scheduled consistent with the one or more critical recommendations.
-
公开(公告)号:US11983252B2
公开(公告)日:2024-05-14
申请号:US16711256
申请日:2019-12-11
Applicant: The Boeing Company
Inventor: Richard J. Dickson
CPC classification number: G06F21/105 , G06F11/302 , G06F11/327
Abstract: Techniques for securing computer executable software for tracking usage of at least one software application are presented. The computer executable software for tracking usage of at least one software application can include tracking software installed on a client and monitoring software installed on the client, where the monitoring software is hidden from users of the tracking software. The techniques can include tracking, by the tracking software, a usage of the at least one software application by the client; obtaining, by the tracking software, a status of the monitoring software; and restarting the monitoring software, by the tracking software, in response to obtaining a status of the monitoring software indicating that the monitoring software is not executing.
-
-
-
-
-
-
-
-
-