Verification of core file debugging resources

    公开(公告)号:US12013774B2

    公开(公告)日:2024-06-18

    申请号:US17877528

    申请日:2022-07-29

    Applicant: Red Hat, Inc.

    Inventor: Aaron Merey

    CPC classification number: G06F11/366 G06F11/327 G06F11/3624

    Abstract: Systems and methods for implementing a verification of core file debugging resources are disclosed. A plurality of mappings are created from a core file comprising a plurality of filenames and a plurality of target build identifiers (IDs). The core file corresponds to a computer program crash event and each one of the plurality of mappings map one of the plurality of filenames to a corresponding one of the plurality of target build IDs. Responsive to creating the plurality of mappings, a first file is located that corresponds to a first filename included in a first mapping from the plurality of mappings. The first comprises a first target build ID. A processing device utilizes the first file to analyze the computer program crash event in response to determining that the first file build ID matches the first target build ID.

    Intelligent workflow for end-of-support solution advisor

    公开(公告)号:US11989085B2

    公开(公告)日:2024-05-21

    申请号:US17656689

    申请日:2022-03-28

    CPC classification number: G06F11/0793 G06F8/65 G06F11/3006 G06F11/327

    Abstract: In an approach for predicting an optimal system upgrade, a processor detects an upgrade is available for a system of a first user computing device. A processor gathers a set of live data from an environment of the first user computing device using a process mining software. A processor compares the set of live data to a set of historical data stored in a knowledge corpus to identify a second user computing device similar to the first user computing device. Responsive to identifying the second user computing device, a processor performs a pattern recognition to generate one or more critical recommendations associated with the upgrade for the system of the first user computing device. A processor schedules the upgrade for the system of the first user computing device during a period of time, wherein the period of time is scheduled consistent with the one or more critical recommendations.

    Software license manager security
    10.
    发明授权

    公开(公告)号:US11983252B2

    公开(公告)日:2024-05-14

    申请号:US16711256

    申请日:2019-12-11

    CPC classification number: G06F21/105 G06F11/302 G06F11/327

    Abstract: Techniques for securing computer executable software for tracking usage of at least one software application are presented. The computer executable software for tracking usage of at least one software application can include tracking software installed on a client and monitoring software installed on the client, where the monitoring software is hidden from users of the tracking software. The techniques can include tracking, by the tracking software, a usage of the at least one software application by the client; obtaining, by the tracking software, a status of the monitoring software; and restarting the monitoring software, by the tracking software, in response to obtaining a status of the monitoring software indicating that the monitoring software is not executing.

Patent Agency Ranking