A portable information handling system hinge rotates in an operational range with an operational torque and in an overbend range with an overbend torque of at least twice the operational torque. A rotational orientation sensor detects rotation past the operational range into the overbend range and commands an alarm to present an alert, such as an audible or visual alarm. The hinge transitions from torque generated by a first set of cams in the operational range to torque generated by a second set of cams in the overbend range with a transition range that ramps the torque up to define rotation stop felt by an end user rotating the information handling system housing.
An apparatus comprises at least one processing device that includes a processor coupled to a memory. The at least one processing device is configured to receive in a storage system from a host device a command specifying an initial number of input-output (IO) queues to be configured for a given target of the storage system, to configure in the storage system the initial number of IO queues for the given target responsive to the received command, and to dynamically adjust in the storage system the number of IO queues configured for the given target based at least in part on an amount of IO operations received by the storage system for the given target. Dynamically adjusting the number of IO queues illustratively comprises increasing the number of IO queues relative to the initial number of IO queues based at least in part on a utilization level of the IO queues.
The technology described herein is directed towards a design and implementation of a subarray of unit cells for an active reconfigurable intelligent surface that is power efficient. The reconfigurable intelligent surface design integrates a power amplifier with subarrays of unit cells to amplify the reflected signal, resulting in an active reconfigurable intelligent surface with relatively low power consumption. For example, rather than equipping each unit cell with its own power amplifier, a power amplifier is shared by a m×n (e.g., 3×3) subarray of unit cells, which can be arranged as a module of a larger reconfigurable intelligent surface. Further, the design provides a device for receiving and reflecting the electromagnetic signal in the same polarization by coupling the RF energy, processing, amplifying, and then introducing a delay module to not create unwanted harmonics and amplifying the signal without breaking the signal link.
Enhanced management of conflicting handovers of a device between cells can be performed. Conflicting handover (CH) detector can detect conflicting handovers of the device between first cell and second cell based on handover information relating to previous handovers of device between cells, first performance indicators (PIs) associated with device and first cell, second PIs associated with device and second cell, and/or third PIs associated with second devices associated with first or second cell, over defined time period. In response to conflicting handovers detection, CH identifier can predict, from a group of types of conflicting handovers of devices, a type of the conflicting handovers of the device between first and second cells based on handover information, first PIs, second PIs, and/or third PIs. CH mitigator can determine the better of first cell or second cell to which to connect device based on rules and first, second, and/or third PIs.
Methods, system, and non-transitory processor-readable storage medium for a file deep compare system are provided herein. An example method includes a patch installation package generator system that receives a plurality of files and a request to generate a patch installation package incorporating a subset of changed files for installation, where the plurality of files comprises the subset of changed files and a subset of unchanged files. A deep file compare system generates human readable files from binary files, wherein the plurality of files comprises the binary files. The deep file compare system determines the subset of changed files within the plurality of files, using the human readable files, and outputs the subset of changed files for generation of the patch installation package incorporating the subset of changed files.
An information handling system stores an interrupt steering mode, and creates a processor set in response to receiving an assignment of the processor set to an application. In response to detecting an interrupt associated with the application, the system measures a current load of a particular processor included in the processor set. If the current load of the processor is less than a target processor load, then the system assigns the particular processor to handle the interrupt.
An apparatus includes at least one processing device comprising a processor coupled to a memory, wherein the at least one processing device is configured to receive data corresponding to operation of at least one device and one or more device components, and predict, using a plurality of machine learning models, a future operational state of the at least one device, at least one impact of the future operational state, and at least one trend associated with the at least one impact, wherein the predictions are based at least in part on the received data. A remediation plan for the at least one device is generated based at least in part on the predictions.
G06F 11/07 - Réaction à l'apparition d'un défaut, p. ex. tolérance de certains défauts
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
8.
IMPLEMENTING USER-SPECIFIC LOCAL ADMINISTRATOR RIGHTS USING ARTIFICIAL INTELLIGENCE TECHNIQUES
Methods, apparatus, and processor-readable storage media for implementing user-specific local administrator rights (LAR) using artificial intelligence techniques are provided herein. An example computer-implemented method includes obtaining data pertaining to at least one request for LAR from a given user; determining one or more recommendations related to the at least one request for LAR by processing at least a portion of the obtained data using one or more artificial intelligence techniques; modifying at least a portion of the LAR associated with the at least one request to encompass at least a portion of the one or more recommendations; and automatically implementing the modified LAR with respect to one or more devices associated with the given user.
A policy level controller coordinates a scheduling and policy engine using a data change metric to dynamically schedule or re-define policies in response to data change rates in data assets in a current data restore session. A supervised learning process trains a model using historical data of restore operations of the system to establish past data change metrics for corresponding restore operations processing the saveset, and modifies policies dictating the restore schedule by determining a data change rate of received data, as expressed as a number of bytes changed per unit of time. In response to input from restore targets regarding present usage, it then modifies the restore schedule to minimize the impact on restore targets that may be at or close to overload conditions.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
10.
Display Device Having an Integrated Wide Angle Camera System
A display device which includes a display component; a display frame; an embedded camera system, the embedded camera system including a camera component, the camera component being physically coupled to the display frame to embed the camera component within the display device and a lens component, the lens component comprising a normal field of view lens portion and a wide angle field of view lens portion.
A system can identify an application package of an application that is configured to execute via a computing platform, wherein the application package comprises a deployment manifest. The system can model respective capabilities of respective computing platforms to produce capability models. The system can, based on determining to execute the application via a selected computing platform of the computing platforms, determine a capability of capabilities of the selected computing platform based on the capability models and the deployment manifest, modify the deployment manifest based on the capability to produce a modified deployment manifest, configure the capability corresponding to specifications of the application identified in the modified deployment manifest, and instantiate the application via the selected computing platform with the modified deployment manifest.
A display KVM switch interfaces with peripheral input devices, such as keyboard and a mouse, to selectively switch inputs from the input devices to one of plural information handling systems simultaneously presenting visual images at the display. A camera monitors a viewing position of the display to detect end user gaze at a first area of the display that shows first visual images of a first information handling system and at a second area of the display that shows visual images of a second information handling system. Inputs are switched between the information handling systems when a gaze is detected at an area presented by the information handling system after a predetermined time period.
G06F 3/023 - Dispositions pour convertir sous une forme codée des éléments d'information discrets, p. ex. dispositions pour interpréter des codes générés par le clavier comme codes alphanumériques, comme codes d'opérande ou comme codes d'instruction
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
G06F 3/0354 - Dispositifs de pointage déplacés ou positionnés par l'utilisateurLeurs accessoires avec détection des mouvements relatifs en deux dimensions [2D] entre le dispositif de pointage ou une partie agissante dudit dispositif, et un plan ou une surface, p. ex. souris 2D, boules traçantes, crayons ou palets
G06F 13/42 - Protocole de transfert pour bus, p. ex. liaisonSynchronisation
13.
MACHINE LEARNING-BASED QUERY PROCESSING OF DOCUMENTS INCLUDING TABULAR DATA STRUCTURES
An apparatus comprises at least one processing device configured to obtain a query comprising search text and a context identifying documents including tabular data structures to be searched using the search text, and to generate document chunks by parsing the documents, the tabular data structures being replaced in the document chunks with tabular data structure representations that maintain tabular formatting of the tabular data structures. The at least one processing device is further configured to select a subset of the document chunks based at least in part on determining a similarity between the document chunks and the search text, to generate a prompt for input to a machine learning system comprising the selected document chunks, and to provide an answer to the query that comprises content from at least one of the tabular data structures based at least in part on an output of the machine learning system.
G06V 30/412 - Analyse de mise en page de documents structurés avec des lignes imprimées ou des zones de saisie, p. ex. de formulaires ou de tableaux d’entreprise
14.
SYSTEMS AND METHODS FOR AUTOMATED CABLE DIAGRAM GENERATION IN AN INFORMATION HANDLING SYSTEM
An information handling system may include a processor and a management controller configured to provide out-of-band management facilities for management of the information handling system, the management controller further configured to access multiple data sources that describe an electrical connectivity topology of the information handling system and based on the multiple data sources, automatically and dynamically generate at least one image for display, the at least one image showing suggested routing and coupling for electrical connectivity among information handling resources of the information handling system.
A networking subsystem/switch device connection configuration system includes a switch device having a switch physical port, and an endpoint device including a networking subsystem having a plurality of networking physical ports. The networking subsystem detects connection of respective cable connectors to each of the plurality of networking physical ports. If the networking subsystem determines that each of the respective cable connectors connected to the plurality of networking physical ports are included on the same cable, it configures a single networking logical port to transmit data between each of the plurality of networking physical ports and the switch physical port.
Facilitating intelligent concept drift mitigation in advanced communication networks is provided herein. A method includes utilizing, by a system comprising a processor, a first model that facilitates management of resources within a communications network. A reliability level of the first model is determined to satisfy a defined reliability level. The method also includes based on a first determination that the reliability level of the first model no longer satisfies the defined reliability level, replacing, by the system, the first model with a second model that temporarily facilitates management of the resources within the communications network. Further, the method includes, based on a second determination that a third model satisfies the defined reliability level, deploying, by the system, the third model within the communications network. The deploying can include incrementally transitioning facilitation of the management of resources from the second model to the third model.
H04L 41/0663 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant la reprise sur incident de réseau en réalisant des actions prédéfinies par la planification du basculement, p. ex. en passant à des éléments de réseau de secours
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
17.
INFORMATION HANDLING SYSTEM TO EXTEND AND SCALE A PLATFORM TELEMETRY FRAMEWORK TO A REMOTE COMPUTE DEVICE
An information handling system includes a memory to store a system trigger event. A processor executes first and second applications, and provides data to the first application via a first data lane and to the second application via a second data lane. The processor retrieves the system trigger event from the memory and determines whether the system trigger event has been detected. In response to the system trigger event being detected, the processor transfers execution of the first application from the information handling system to a remote compute device and creates a third data lane from the data to the first application being executed on the remote compute device. The processor provides the data to the first application being executed on the remote compute device.
A method facilitating storage capacity expansion using volume addition for cloud computing clusters includes suspending, by a system including at least one processor, changes to an infrastructure configuration of a group of virtual machines (VMs) of a cloud computing system in response to receiving a request to expand a storage capacity of the group of VMs; associating, by the system in response to the suspending, new storage volumes with respective VMs of the group of VMs; and resuming, by the system, the changes to the infrastructure configuration of the group of VMs in response to the associating being determined to have successfully completed.
An information handling system may include an information handling resource comprising an embedded temperature sensor and a thermal monitoring system configured to receive temperature information from the embedded temperature sensor, receive operational state information for the information handling system, and based on the temperature information and the operational state information, determine if an undesired heating event is present within the information handling resource.
Host-resident software such as a Multi-Path Input-Output (MPIO) driver generates notifications of scheduled host shutdowns and unscheduled host shutdowns. A storage node generates emergency snapshots of storage objects masked to the host server in response to receipt of an unscheduled shutdown notification. The storage node also generates emergency snapshots of storage objects masked to a host server in response to detection of a reboot sequence of the host server when a corresponding scheduled shutdown notification was not received beforehand.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
A system can receive respective information of a group of networks, wherein the respective information identifies a respective geographical area, a respective amount of bandwidth of the respective network, and whether the amount of bandwidth is to be requested or donated. The system can determine respective first coverage options for respective networks of the group of networks based on the respective information. The system can, after determining the respective first coverage options, receive a request from a network of the group of networks for bandwidth from another network of the group of networks. The system can, based on the request, determine second coverage options for the network based on the respective first coverage options and based on respective amounts of available bandwidth of the group of networks determined after receiving the request. The system can facilitate the network utilizing a second coverage option of the second coverage options.
A method for managing an anomaly in a client includes: obtaining, by an analyzer, historical metadata (HM); obtaining, by the analyzer, an error description that is associated with the HM; analyzing, by the analyzer, the HM to generate a first data frame (DF); generating, by the analyzer, a second DF and a third DF based on the first DF, in which the second DF and the third DF are sent to an engine; generating, by the analyzer, a fourth DF based on the first DF and error description, in which the fourth DF is sent to the engine; tuning, by the engine, an anomaly detection model (ADM) to obtain a tuned ADM using: a first target parameter (TP) and the second DF; a second TP and the third DF; a third TP and the fourth DF; and initiating, by the engine, notification of an administrator about the tuned ADM.
A method for managing data protection includes initiating, by a backup server, identifying an active directory (AD) application on the VM, wherein the AD application comprises a set of AD objects and a directory service for managing the set of AD objects, in response to identifying the AD application, installing a new AD listener in the production environment, performing listening on the AD application in the production environment to detect changes to the set of AD objects, monitoring, by the backup server, generating a VM backup of the VM and an AD application backup of the AD application, and storing the VM backup and the AD application backup in a backup storage system, based on the VM backup generation, and based on the listening, performing a backup schedule analysis on the backup schedule, and based on the backup schedule analysis, performing a backup schedule modification on the backup schedule.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
24.
Leveraging recurrent patterns of RAID members distribution for efficient array growth
A predictable distribution of protection group members and spares in compliance with RAID requirements is maintained as a drive cluster is scaled-up and eventually split into multiple clusters. Conditions under which addition of new disks using rotation-relocation and cell borrowing would create recurrent patterns of distribution of protection group members are recognized and the associated groups of disks are index-swapped to reduce the amount of data and parity information that needs to be relocated.
A method for managing data protection includes initiating, by a backup server, identifying an active directory (AD) application on the VM, wherein the AD application comprises a set of AD objects and a directory service for managing the set of AD objects, in response to identifying the AD application, installing a new AD listener in the production environment, performing listening on the AD application in the production environment to detect changes to the set of AD objects, monitoring, by the backup server, generating a VM backup of the VM and an AD application backup of the AD application, and storing the VM backup and the AD application backup in a backup storage system, based on the VM backup generation, and based on the listening, performing a backup schedule analysis on the backup schedule, and based on the backup schedule analysis, performing a backup schedule modification on the backup schedule.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
Electronic hardware components include integrated near field communications (NFC) modules configured to respond to authentication messages sent by a baseboard management controller (BMC). The authentication messages include cryptographic authentication challenges. The hardware component NFC modules are configured with private keys to decrypt messages sent by the BMC and digitally sign information such as VPD and SN that identify the hardware component. Secure component verification using NFC helps to detect component substitution attacks.
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
G06F 21/73 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par création ou détermination de l’identification de la machine, p. ex. numéros de série
Methods and systems for managing service deployment are disclosed. To deploy services, dependencies and other characteristics (such as context data, capability data, placement rules, and workflow data) of services and the infrastructure boundaries in which the services are running may be dynamically collected, analyzed and updated. By dynamically analyzing dependencies and other characteristics (such as context data, capability data, placement rules, and workflow data) of services and the infrastructure boundaries, efficiency of use of computing resources may be improved by recycling existing workflow; statically defined operations and hard-coded conditional logic of services may also be avoided each time an environment in which the services are running has changed.
H04L 41/5054 - Déploiement automatique des services déclenchés par le gestionnaire de service, p. ex. la mise en œuvre du service par configuration automatique des composants réseau
H04L 41/50 - Gestion des services réseau, p. ex. en assurant une bonne réalisation du service conformément aux accords
Methods and systems for managing service deployment are disclosed. To deploy services, dependencies and other characteristics (such as context data, capability data, placement rules, and workflow data) of services and the infrastructure boundaries in which the services are running may be dynamically collected, analyzed and updated. By dynamically analyzing dependencies and other characteristics (such as context data, capability data, placement rules, and workflow data) of services and the infrastructure boundaries, efficiency of use of computing resources may be improved by recycling existing workflow; statically defined operations and hard-coded conditional logic of services may also be avoided each time an environment in which the services are running has changed.
Methods and systems for managing service deployment are disclosed. To deploy services, dependencies and other characteristics (such as context data, capability data, placement rules, and workflow data) of services and the infrastructure boundaries in which the services are running may be dynamically collected, analyzed and updated. By dynamically analyzing dependencies and other characteristics (such as context data, capability data, placement rules, and workflow data) of services and the infrastructure boundaries, efficiency of use of computing resources may be improved by recycling existing workflow; statically defined operations and hard-coded conditional logic of services may also be avoided each time an environment in which the services are running has changed.
An apparatus comprises at least one processing device configured to determine a set of one or more log patterns to utilize for scanning a set of logs associated with one or more information technology assets, a given one of the log patterns comprising a mapping between (i) at least a portion of a given raw log entry and (ii) a given descriptive textual label representing content of the given raw log entry. The at least one processing device is also configured to scan the set of logs associated with the one or more information technology assets to identify instances of the determined set of log patterns, to generate a log timeline of the identified instances of the determined set of log patterns, and to utilize the generated log timeline to cross-correlate the identified instances of the determined set of log patterns for the one or more information technology assets.
Methods and systems for load balancing requests from clients across server devices are disclosed. The method may include obtaining a request from one of the clients. The method may also include making a determination regarding whether a load signature for the one of the clients is available. When the load signature for the one of the clients is available, one of the server devices may be selected based at least in part on the load signature and the selected one of the server devices may be assigned to service the request from the one of the clients.
Methods and systems for managing inference models are disclosed. Input data from one or more data sources associated with the inference model may become unavailable, which may impede inference generation by an inference model. The inference model may be made up of modular sub-network units and each data source may be associated with a sub-network unit. A second inference model may generate inferences to predict data source unavailability. If one or more data sources are predicted to become unavailable, the sub-network unit associated with the unavailable data source may be substituted with another sub-network unit. The replacement sub-network unit may duplicate operation of the sub-network unit within a threshold and may be previously trained so that the replacement sub-network unit is substituted into the inference model without re-training the inference model. By doing so, an updated inference model may be obtained, and inference generation may resume.
Methods and systems for managing inference models are disclosed. Input data from one or more data sources associated with the inference model may become unavailable, which may impede inference generation by an inference model. The inference model may be made up of modular sub-network units and each data source may be associated with a sub-network unit. If one or more data sources becomes unavailable, the sub-network unit associated with the unavailable data source may be substituted with another sub-network unit. The replacement sub-network unit may duplicate operation of the sub-network unit within a threshold and may be previously trained so that the replacement sub-network unit is substituted into the inference model without re-training the inference model. By doing so, an updated inference model may be obtained, and inference generation may resume.
An information handling system includes an embedded controller that communicates with multiple components. The embedded controller receives complete collection rules for a collection of data associated with the components of the information handling system. The embedded controller begins an execution of a telemetry service. During the execution of the telemetry service, the embedded controller collects data associated with the components based on the complete collection rules. The embedded controller provides the collected data to a requesting component.
An information handling system includes a memory and a processor. The memory stores a quality of service (QOS) table that includes parameters for a target application. The processor identifies the target application from multiple applications and receives a requested QoS for the target application. The processor determines a system workload class associated with the target application and determines a system level QoS associated with the target application. Based on the requested QoS, the system workload class, and the system level QoS, the processor determines a derived QoS for the target application. The requested QoS, the system workload class, the system level QoS, and the derived QoS are stored in the QoS table. Based on the derived QoS, the processor determines whether the target application is a candidate for migration from the information handling system to an offload compute device.
Techniques for handling mixed metadata (MD) updates using an MD delta log and log structured MD. The techniques include, while performing a transaction commit operation, writing, to an MD delta log, raw delta updates to MD pages, logical-to-physical address translation table (TT) updates for MD pages containing bulk updates, and specialized flags for the MD pages containing bulk updates. For each MD page containing bulk updates, raw delta updates, a TT update, and a specialized flag are written to the MD delta log in association with a transaction identifier. The techniques include generating an MD stream for the MD pages containing bulk updates, and passing the MD stream to an MD pages tier of a storage array. The techniques include, in response to a predetermined event, replaying the MD delta log to apply valid delta updates to at least one MD page containing bulk updates in the MD pages tier.
A speaker is provided for a mobile device. The speaker includes a bottom cover formed of a first metallic material and a top cover is formed of a second metallic material. A diaphragm is affixed to the top cover, and the top cover is sealed to the bottom cover.
H04R 1/02 - BoîtiersMeublesMontages à l'intérieur de ceux-ci
H04R 1/22 - Dispositions pour obtenir la fréquence désirée ou les caractéristiques directionnelles pour obtenir la caractéristique de fréquence désirée uniquement
An information handling system camera provides a ninety degree field of view with low distortion in low light environments by a capturing visual images through a lens having eight lens elements. The first lens element closest to the object and eighth lens element closest to the image each have a glass material, positive refractive power and spherical surface. The middle six lens elements each have a plastic material and aspherical surfaces that direct light to an image sensor through a variety of positive and negative refractive powers.
G02B 9/64 - Objectifs optiques caractérisés à la fois par le nombre de leurs composants et la façon dont ceux-ci sont disposés selon leur signe, c.-à-d. + ou — ayant plus de six composants
G02B 13/00 - Objectifs optiques spécialement conçus pour les emplois spécifiés ci-dessous
One example method includes providing an input to a generative model that was trained using a training dataset, and the input comprises a feature set of a quantum circuit, performing, with the generative model, a reverse phase process that removes noise from one or more training samples that were used to train the generative model, in conjunction with the reverse phase process, consulting, by the generative model, a guidance loss, and generating, based in part on the guidance loss, a set of samples, and one of the samples comprises a tensor network that represents the quantum circuit.
Techniques are provided for pod-based control of system testing load. One method comprises obtaining a test script that tests a system; executing the test script on at least one pod of a containerized environment, wherein the execution of the test script on the at least one pod generates a load on the system; and automatically controlling an amount of the load generated by the test script on the system at a given time by adjusting a number of the pods of the containerized environment executing the test script. A number of pods executing a given containerized test script may be adjusted to provide a corresponding adjustment to the applied load. A given node cluster of multiple node clusters may be selected to execute the test script based on a resource availability of the node clusters.
Methods and systems for managing service deployment are disclosed. To deploy services, dependencies and other characteristics (such as context data, capability data, placement rules, and workflow data) of services and the infrastructure boundaries in which the services are running may be dynamically collected, analyzed and updated. By dynamically analyzing dependencies and other characteristics (such as context data, capability data, placement rules, and workflow data) of services and the infrastructure boundaries, efficiency of use of computing resources may be improved by recycling existing workflow; statically defined operations and hard-coded conditional logic of services may also be avoided each time an environment in which the services are running has changed.
H04L 41/5054 - Déploiement automatique des services déclenchés par le gestionnaire de service, p. ex. la mise en œuvre du service par configuration automatique des composants réseau
43.
DATABASE MANAGEMENT BASED ON PREDICTED RETRIEVAL OF DATA
Methods and systems for managing data are disclosed. Data may be stored in a database based on a likelihood that the data is to be read from the database. Data may be stored as a reduced-size representation of the data if the data is unlikely to be read from the database. Some requests for data may be associated with timeliness requirements. If data associated with a timeliness requirement is stored as a reduced-size representation, a likelihood of violating the timeliness requirement while reconstructing the data may be increased. Therefore, data that is likely to be requested may be stored in a reconstructed full-size form in a cache of the database. By doing so, the reconstructed full-size forms of the data may be retrieved from the cache and used for providing computer-implemented services in compliance with timeliness requirements for the data.
In at least one embodiment, processing can include receiving a command at a first node in a system, wherein the first node manages first user data (UD) log resources and a second node of the system manages second UD log resources. The first and second nodes can generate sequence numbers from corresponding node-local sequences. Each command of a UD log is associated with a generic serial number (GENSN). Responsive to determining the command is a write I/O directed to logical addresses owned by the first node, the first node can perform processing to record the write I/O in the UD log without any internode communication with the second node. The recorded write I/O can be associated with a GENSN including a non-zero value that is a sequence number of the first node's local sequence and a zero value corresponding to the second node.
An apparatus comprises at least one processing device configured to select a test case associated with a test script comprising functional code for testing an information technology asset and a test case description. The at least one processing device is also configured to generate, utilizing a first machine learning model, first pseudocode for the test script based at least in part on the functional code of the test script, and to generate, utilizing a second machine learning model, second pseudocode for the test script based at least in part on the test case description. The at least one processing device is further configured to determine a stability of the test script based at least in part on a similarity between the first and second pseudocode, and to automatically control one or more characteristics of the functional code of the test script based at least in part on the determined stability.
Methods, apparatus, and processor-readable storage media for determining security risks related to local administrator rights (LAR) activity are provided herein. An example computer-implemented method includes obtaining data pertaining to one or more activities performed by at least one user acting in connection with at least one granted set of LAR; classifying the one or more activities into one or more security risk-based categories by processing at least a portion of the obtained data; determining one or more security-related recommendations based at least in part on the classifying of the one or more activities into the one or more security risk-based categories; and performing at least one automated action based at least in part on at least a portion of the one or more security-related recommendations.
A technique is directed to servicing a read request. The technique includes establishing a set of write indicators corresponding to a set of storage locations designated by the read request. The technique further includes, while the set of write indicators is accessible to a possible write operation that designates the set of storage locations to be written to, buffering data from the set of storage locations. The technique further includes, after buffering the data from the set of storage locations, checking the set of write indicators to ascertain whether the set of storage locations has been designated to be written to since establishing the set of write indicators.
Methods and systems for managing inference models are disclosed. An inference model may be divided into any number of sub-network units and each sub-network unit of the sub-network units may be located in a different geographical location. Data privacy regulations may apply to the geographical locations. Therefore, a first sub-network unit may be subject to a first data privacy regulation and a third sub-network unit may be subject to a second data privacy regulation. If an output of a sub-network unit is not usable by a downstream sub-network unit due to differences in data privacy regulations, the first sub-network unit may be replaced with a second sub-network unit, the second sub-network unit generating an output that does meet the data privacy regulations of the downstream sub-network unit. Doing so may reduce interruptions to inference generation by the inference model.
A device network manager, that monitors edge and Internet of Things (IoT) devices on a device network, receives a data processing request, wherein the data processing request specifies an edge device to process data. In response to receiving the data processing request, the device network manager performs a method that includes making a determination that the edge device is in sleep mode, based on the determination, obtaining an energy conservation policy from device network storage, determining a backup strategy for the data processing request using the energy conservation policy, and applying the backup strategy to service the data processing request.
Methods, apparatus, and processor-readable storage media for automatically generating and targeting communications using artificial intelligence techniques are provided herein. An example computer-implemented method includes obtaining notification data associated with one or more software applications and/or one or more processing devices; determining at least one issue and one or more actions for resolving at least a portion of the issue(s) by processing at least a portion of the notification data using one or more artificial intelligence techniques; identifying at least one recipient of communication data related to the at least one issue by processing user-related data, across multiple users, in connection with the issue(s) and/or the action(s); generating the communication data including identification of the issue(s) and a recommendation for performing the action(s); and transmitting at least a portion of the communication data to the at least one recipient.
H04L 51/043 - Messagerie en temps réel ou quasi en temps réel, p. ex. messagerie instantanée [IM] en utilisant ou en gérant les informations de présence
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
H04L 41/5019 - Pratiques de respect de l’accord du niveau de service
53.
DETERMINING LOCAL ADMINISTRATOR RIGHTS-RELATED DEPENDENCY RELATIONSHIPS USING ARTIFICIAL INTELLIGENCE TECHNIQUES
Methods, apparatus, and processor-readable storage media for determining local administrator rights-related (LAR-related) dependency relationships using artificial intelligence techniques are provided herein. An example computer-implemented method includes obtaining data pertaining to multiple actions performed across one or more software applications by one or more user devices; determining one or more action dependency relationships associated with at least one action performed by a given one of the user devices in connection with a given one of the software applications, by processing at least a portion of the obtained data using artificial intelligence techniques; modifying one or more LARs, granted for the given user device, to permit access to the given user device to perform one or more actions in connection with at least one of the software applications in accordance with the determined action dependency relationship(s); and performing one or more automated actions based on the modifying of the LAR(s).
A method facilitating volume replacement using cloud volume snapshots includes halting, by a system including at least one processor, input/output (I/O) activity to a first volume of a cloud computing system in response to the first volume being determined to be unreachable; obtaining, by the system, a snapshot of the first volume in response to the halting; and creating, by the system, a second volume, of the cloud computing system and other than the first volume, using the snapshot.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
55.
SYSTEM AND METHOD FOR PROVIDING COMPRESSION ATTACHED MEMORY MODULE COMPRESSION CONNECTORS
A z-axis compression connector includes a plurality of high-speed signal contacts arranged in a grid of M rows by N columns, and a plurality of signal return contacts arranged between the N columns. A first signal return contact is positioned mid-way in line between a first signal contact and a second signal contact, where the first signal contact is in a first row and a first column and the second signal contact is in the first row and a second column adjacent to the first column.
G11C 5/04 - Supports pour éléments d'emmagasinageMontage ou fixation d'éléments d'emmagasinage sur de tels supports
H01R 12/71 - Dispositifs de couplage pour circuits imprimés rigides ou structures similaires
H01R 13/6471 - Moyens pour empêcher la diaphonie par agencement particulier des conducteurs de mise à la masse et de signaux, p. ex. GSGS [mise à la masse - signal - mise à la masse - signal]
H01R 43/20 - Appareils ou procédés spécialement adaptés à la fabrication, l'assemblage, l'entretien ou la réparation de connecteurs de lignes ou de collecteurs de courant ou pour relier les conducteurs électriques pour assembler les pièces de contact avec le socle isolant, le boîtier ou le manchon ou pour les en désassembler
56.
NEURAL NETWORK INTRUSION DETECTION SYSTEM IN EDGE SYSTEM
A neural network intrusion detection system (NNIDS) monitors network traffic between a plurality of devices in a system to obtain raw traffic data, processes the raw traffic data to obtain processed traffic data, applies an intrusion detection model to the processed traffic data, makes a determination, based on the applying, that an anomaly is detected in the processed traffic data, and based on the determination, implements a data privacy protection policy to remediate the anomaly.
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
Methods, apparatus, and processor-readable storage media for asset access tags and uses thereof are provided herein. An example apparatus includes at least one processing device comprising a processor coupled to a memory; and at least one antenna coupled to the at least one processing device; the at least one processing device being configured: to obtain data, from a network switch, related to one or more aspects of the network switch; to store at least a portion of the obtained data using at least a portion of the memory; and to output, in conjunction with the at least one antenna, the at least a portion of the obtained data to one or more user devices.
H04B 5/70 - Systèmes de transmission en champ proche, p. ex. systèmes à transmission capacitive ou inductive spécialement adaptés à des fins spécifiques
A handle may include a first member, a second member, and a third member. The second member may extend substantially perpendicular from a first surface of the first member and may be mechanically interfaced between the first member and the third member. The third member may include a plurality of planar assembly alignment features configured to align the handle relative to a planar assembly to enable a heat sink coupled to the planar assembly to extend over the third member.
Enhanced tag management of QoS tags associated with services can be performed. Network monitor component (NMC) can send test signals to network equipment to trigger sending of test messages and test response messages associated with tags between network equipment. NMC can receive performance indicator information from network equipment based on network responses associated with tags to test messages. NMC can analyze performance indicator information, service specifications of services, original QoS tag information, and current QoS tag information, and can perform an iterative prediction process, to predict or determine which services can be satisfied at which tags, isolate a source of service degradation, and determine whether adjustments to assignments of tags are to be performed. Based on analysis results, NMC can promote a portion of data packets of a service from an original tag to a higher tag, or demote a service from a higher tag to its original tag.
H04L 43/55 - Test de la qualité du niveau de service, p. ex. simulation de l’utilisation du service
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
H04L 43/0817 - Surveillance ou test en fonction de métriques spécifiques, p. ex. la qualité du service [QoS], la consommation d’énergie ou les paramètres environnementaux en vérifiant la disponibilité en vérifiant le fonctionnement
A technique is directed to providing endurance to solid state device (SSD) storage. The technique involves storing data in an erase block of the SSD storage. The technique further involves detecting that an internal periodic refresh service operating within the SSD storage is currently configured to perform a refresh operation for the erase block at a target refresh time that is within an upcoming amount of time. The technique further involves, in response to detecting that the internal periodic refresh service is currently configured to perform a refresh operation for the erase block at the target refresh time that is within the upcoming amount of time, performing a system-level garbage collection operation on the data stored in the erase block to prevent the internal periodic refresh service from performing a refresh operation for the erase block at the target refresh time.
A flush set of data pages to flush from a cache to non-volatile data storage is identified, and a compression group is identified that is made up of similar data pages within the flush set. A previously compressed data page is identified in non-volatile data storage that is similar to the data pages in the compression group. Data compression is performed on the compression group using a compression dictionary for the previously compressed data page. A flush set specific hash index and a global hash index may be used to identify the similar data pages in the compression group and the similar previously compressed data page. An indication of the similar previously compressed data page may be stored in the compressed block generated for the compression group, and the compression dictionary for the previously compressed data page need not be duplicated in the non-volatile data storage.
G06F 12/0891 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache utilisant des moyens d’effacement, d’invalidation ou de réinitialisation
62.
Method and system for detecting anomalous sub- sequences in metadata using rolling windows
A method for managing an anomaly in a client includes: obtaining, by an analyzer, historical metadata (HM); obtaining, by the analyzer, an error description that is associated with the HM; analyzing, by the analyzer, the HM to generate a first data frame (DF); generating, by the analyzer, a second DF and a third DF based on the first DF, in which the second DF and the third DF are sent to an engine; generating, by the analyzer, a fourth DF based on the first DF and error description, in which the fourth DF is sent to the engine; tuning, by the engine, an anomaly detection model (ADM) to obtain a tuned ADM using: a first target parameter (TP) and the second DF; a second TP and the third DF; a third TP and the fourth DF; and initiating, by the engine, notification of an administrator about the tuned ADM.
A firmware management operation. The firmware management operation includes providing an information handling system with a distributed BIOS, the distributed BIOS including a BIOS component and a BIOS variable; identifying a processor environment installed on an information handling system from a plurality of processor environments; and, performing an information handling system stack tuning operation, the information handling system stack tuning operation providing a set of tuned stack components, the set of tuned stack components being tuned for the processor environment installed on the information handling system.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
64.
Processor Environment Agnostic Information Handling System Firmware Unified Runtime Trusted Communication Operation
A firmware management operation. The firmware management operation includes providing an information handling system with a distributed BIOS, the distributed BIOS including a BIOS component and a BIOS variable; identifying a processor environment installed on an information handling system from a plurality of processor environments; performing a processor environment agnostic information handling system firmware unified runtime communication operation, the processor environment agnostic information handling system firmware unified runtime communication operation managing firmware communication with a battery of the information handling system based upon the processor environment installed on the information handling system.
A firmware management operation. The firmware management operation includes providing an information handling system with a distributed BIOS, the distributed BIOS including a BIOS component and a BIOS variable; identifying a processor environment installed on an information handling system from a plurality of processor environments; performing a trusted execution environment operation, the trusted execution environment operation creating a trusted execution environment within the information handling system, the trusted execution environment providing a trust zone for use with an operating system runtime emulation operation.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
66.
SYSTEM AND METHOD FOR HYBRID AUTO EXPOSURE IMAGING CORRECTIONS
A webcam includes a hardware microcontroller and a memory device. The hardware microcontroller executes program code of a hybrid face detection auto exposure module to detect a user's face within an image captured by the webcam and define a first image region of interest of the image that includes the user's face with the second image region of interest of the image including a background of the image, executes program code of a lighting detection module to detect brightness levels of the user's face within the first image region of interest and brightness levels in the second image region of interest, and executes program code of a hybrid face detection auto exposure module to determine if a background brightness change threshold level is exceeded and to automatically adjust an exposure setting for the first image region of interest of the image captured by the webcam when the threshold is exceeded.
H04N 23/611 - Commande des caméras ou des modules de caméras en fonction des objets reconnus les objets reconnus comprenant des parties du corps humain
G06T 7/246 - Analyse du mouvement utilisant des procédés basés sur les caractéristiques, p. ex. le suivi des coins ou des segments
H04N 23/71 - Circuits d'évaluation de la variation de luminosité
H04N 23/73 - Circuits de compensation de la variation de luminosité dans la scène en influençant le temps d'exposition
Techniques are disclosed for semantic moderation of conversational agents. An example system includes a memory having instructions, and a processor communicatively coupled to the memory and configured to execute the instructions. Example instructions include: scoring a received input string against a plurality of target classes to derive two or more scores, wherein each target class is associated with an independent score, and the scoring is performed without applying a softmax function to the independent scores; using the scores to generate a rule-based determination that indicates whether to pass or filter the input string; upon a determination to filter the input string, performing filtering processing on the input string; and otherwise, performing output processing on the input string.
Techniques are provided for machine learning-based detection of anomalous object behavior in a monitored physical environment. One method includes obtaining activity maps comprising data characterizing objects of a respective object type within a monitored physical environment; applying the activity maps to a machine learning model trained to generate one or more predicted activity maps; comparing the one or more predicted activity maps to corresponding activity maps; and, in response to a result of the comparison indicating anomalous object behavior, initiating at least one automated action. A given activity map may comprise multiple cells, wherein a given cell is mapped to a corresponding portion of the monitored physical environment. The given activity map may correspond to a particular object type and the given cell may comprise aggregated data characterizing objects of the particular object type in the given cell.
Systems and methods for hierarchical workspace orchestration are described. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include: a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: determine, by a local management agent configured to instantiate a primary workspace, that an operation involving a subordinate workspace instantiated by a peripheral device coupled to the IHS comprises sensitive data; and determine whether to process the sensitive data prior to execution of the operation.
Systems and methods for hierarchical workspace orchestration are described. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include a processor and a memory, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive first one or more files from a workspace orchestration service, where the first one or more files are usable by the IHS to instantiate a first workspace; and provide second one or more files from the first workspace to a first peripheral device, where the second one or more other files are usable by the first peripheral device to instantiate a second workspace, where the second workspace is configured to provide third one or more files to a second peripheral device coupled to the first peripheral device, and where the third one or more files are usable by the second peripheral device to instantiate a third workspace.
Systems and methods for proxy device orchestration as autonomous primary workspace are described. In an illustrative, non-limiting embodiment, an Information Handling System (IHS may be configured to provide a workspace orchestration service, the IHS comprising: a processor; and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: communicate with a proxy peripheral device disposed at a location where one or more client IHSs have primary workspaces instantiable through the workspace orchestration service; and provide one or more files to the proxy peripheral device, where the proxy peripheral device is configured to instantiate a primary workspace based upon the one or more files in the absence of any of the one or more client IHSs at the location.
Systems and methods for user steering through workspace orchestration are described. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: receive, at a local management agent from a workspace orchestration service, one or more files configured to enable the local management agent to instantiate a workspace based upon a workspace definition, where the workspace definition enables the workspace to communicate with a selected peripheral device.
Enhanced Information Handling System (IHS) messaging infrastructure security may include setting up, by a message producer, via a messaging resource rotation service, messaging resources in a message broker. The messaging resource rotation service may assign a routing key variable, and then a message consumer may subscribe, via the messaging resource rotation service, to the messaging resources pointed out by the routing key variable. The message producer may fetch a routing key variable derived value, to post a message, using this routing key derived variable value. Thereafter, the message broker may notify the subscribed message consumer about the posting of the message. Additionally, the messaging resource rotation service may rotate the routing key variable and/or the routing key variable derived value, may notify the message consumer of the new routing key in the message broker, and/or may store the routing key variable in a key vault, or with key management service.
A user equipment may use a learning model to predict user behavior, or traffic corresponding thereto, and may transmit, to a radio network node, a prediction report indicative of the predicted behavior/traffic. Based on the prediction report the node may proactively schedule predicted downlink resources to facilitate delivery, to the user equipment, of predicted downlink traffic that may correspond to the indicated predicted behavior/traffic. The user equipment may indicate that successfully decoded downlink traffic, received from the node according to the scheduled predicted downlink resources, is invalid, or not usable, by avoiding transmission of HARQ feedback corresponding to the received traffic or by transmitting an invalid scheduled resource indication. The user equipment may analyze a confidence level corresponding to the learning model with respect to a confidence level threshold, which may be dynamically increased by the node in response to invalid traffic, to determine whether to transmit a prediction report.
A radio access network node may configure a user equipment with multiple buffer status report tables. The node may transmit to the user equipment a buffer status reporting configuration comprising an indication of one or more of the configured tables that have been activated for use by the user equipment to generate buffer status reports. If the buffer status reporting configuration indicates that the node is implementing underscheduling of uplink resources in response to buffer status reports, the user equipment may select one or more of the activated configured tables that may result in a fewest number of transmissions of buffer status reports to obtain uplink resources to facilitate transmission of buffered traffic. The user equipment may transmit to the node one or more buffer status reports that each comprise a traffic volume index and a table indication indicative of a selected table corresponding to the traffic volume index.
A macro radio access network node may broadcast a master information block secondary access information indication indicative of secondary access information that may be usable by a user equipment to access a micro radio access network node, corresponding to a micro node coverage zone that overlaps, or lies within, a covered zone corresponding to the macro node, during an activated energy saving mode period, at the micro node, during which the micro node may avoid transmission of synchronization signal block signals. A user equipment operating in an idle mode and located within a coverage zone corresponding to the micro node may detect a synchronization signal block signal transmitted by the macro node and may decode secondary access information, corresponding to the micro node, from a system information block, transmitted by the macro node, indicated by a master information block transmitted by the macro node.
H04W 48/10 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p. ex. distribution de données d'exploration utilisant des informations radiodiffusées
H04W 48/16 - ExplorationTraitement d'informations sur les restrictions d'accès ou les accès
77.
DEVICE ASSISTED INTERCELL DOWNLINK RADIO SYNCHRONIZATION
A macro radio access network node may broadcast a master information block secondary access information indication indicative of secondary access information that may be usable by a user equipment to access a micro radio access network node, corresponding to a micro node coverage zone that overlaps, or lies within, a covered zone corresponding to the macro node, during an activated energy saving mode period, at the micro node, during which the micro node may avoid transmission of synchronization signal block signals. A user equipment operating in an idle mode and located within a coverage zone corresponding to the micro node may detect a synchronization signal block signal transmitted by the macro node and may decode secondary access information, corresponding to the micro node, from a system information block, transmitted by the macro node, indicated by a master information block transmitted by the macro node.
An apparatus comprises one or more transceiver ports and at least one processing device comprising a processor coupled to a memory. The at least one processing device is configured to detect a transceiver light plug interconnected with a transceiver plugged into a given one of the transceiver ports, and to exchange, via a first set of connectors of the transceiver which are operably connected with a second set of connectors of the transceiver light plug, configuration information for light-based indicators arranged on a housing of the transceiver light plug. The at least one processing device is also configured to determine an operational status of the given transceiver port, and to provide, to the transceiver light plug via the first and second sets of connectors, control information for controlling operation of the light-based indicators based at least in part on the determined operational status of the given transceiver port.
H01R 13/717 - Association structurelle avec des composants électriques incorporés avec une source lumineuse intégrée
H01R 13/502 - SoclesBoîtiers composés de différentes pièces
H01R 13/641 - Moyens pour empêcher, bloquer ou éviter le couplage incorrect par l'indication du couplage incorrectMoyens pour empêcher, bloquer ou éviter le couplage incorrect par l'indication d'un engagement complet ou correct
H01R 13/66 - Association structurelle avec des composants électriques incorporés
An apparatus comprises a housing comprising at least one of one or more out-of-band management (OOBM) ports and one or more OOBM indicators, and a connector coupled to the housing, the connector configured for operable interconnection with a pluggable management module port of a computing device. The apparatus also comprises at least one processing device configured to exchange, with the computing device, configuration information for the OOBM ports and the OOBM indicators, and to receive, from the computing device, OOBM information for controlling operation of the OOBM ports and the OOBM indicators, the OOBM information being based at least in part on a determined operational status of one or more components of the computing device. The at least one processing device is also configured to control, based at least in part on the received OOBM information, operation of the OOBM ports and the OOBM indicators.
A wireless transceiver information provisioning device includes a wireless transceiver information provisioning device chassis, a transceiver device connector on the wireless transceiver information provisioning device chassis that is connected to a wireless transceiver information provisioning device connector on a transceiver device that is connected to a port, and a wireless communication subsystem housed in the wireless transceiver information provisioning device chassis and coupled to the transceiver device connector. The wireless communication subsystem receives transceiver information associated with the transceiver device via the transceiver device connector, and stores the first transceiver information. When the wireless communication subsystem wirelessly subsequently receives a transceiver information request from a wireless device, it wirelessly transmit the transceiver information to the wireless device.
Described herein are methods and a system device management of multiple tools or consoles in a data center, where the consoles control devices in the data center. The consoles are identified with unique identifiers. A capability list of devices in the data center, a provider policy as to the multiple consoles, and a grant matrix as to device capability and consoles is used by a baseboard management controller of a device to determine control of a console over the device.
H04L 67/125 - Protocoles spécialement adaptés aux environnements propriétaires ou de mise en réseau pour un usage spécial, p. ex. les réseaux médicaux, les réseaux de capteurs, les réseaux dans les véhicules ou les réseaux de mesure à distance en impliquant la commande des applications des terminaux par un réseau
H04L 67/51 - Découverte ou gestion de ceux-ci, p. ex. protocole de localisation de service [SLP] ou services du Web
82.
System and method for registering and relaying custom events and notices from node device to node device in peripheral device workspaces managed by a remote peripheral device cloud orchestrator server
An information handling system node includes a hardware processor, a memory device, a power management unit with a peripheral device node operatively coupled to the information handling system node. The hardware processor may execute computer-readable program code of a custom event and device manageability service sub-agent to discover the peripheral device node operatively coupled to the information handling system node including a unique peripheral device identification (ID), request and receive, via a unified device application programming interface module, peripheral device capabilities and event IDs, where the event IDs describe custom events that are transmittable via any bus protocol from the peripheral device node, and register for custom event notifications with the peripheral device node by sending callback messages to the peripheral device node describing which custom events to receive custom event notifications about and setting custom event triggers that trigger the custom event notifications.
A firmware management operation. The firmware management operation includes providing an information handling system with a distributed BIOS, the distributed BIOS including a BIOS component and a BIOS variable; identifying a processor environment installed on an information handling system from a plurality of processor environments; performing a processor agnostic information handling system operating mode management operation, the processor agnostic information handling system operating mode management managing an aspect of an operating mode of the information handling system.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
84.
SYSTEM AND METHOD FOR DETERMINING AND RECOMMENDING PURCHASE OF PERIPHERAL DEVICES FOR AN EXISTING PERIPHERAL DEVICE WORKSPACE BASED ON PERIPHERAL DEVICE WORKSPACE CAPABILITIES
A peripheral device workspace cloud orchestrator executing on a server comprises a network interface device to receive an operational telemetry data reading indicating communication port functional capabilities for each communication port at an anchor information handling system node and for peripheral device nodes that have been previously operatively coupled to the anchor information handling system node at a location to form a defined peripheral device workspace identified by a peripheral device workspace identification value, and a hardware processor executing code instructions to identify an available port for communication via a communication protocol and identify its power delivery capabilities based on the operational telemetry data reading that is available for coupling with a new peripheral device, and to recommend that a user purchase the new peripheral device selected from a product purchase platform that can be met by the power delivery capability and communication protocol capabilities for the available port.
A peripheral device workspace cloud orchestrator server includes a hardware processor, a power management unit to provide power to the hardware processor and memory device, and a network interface device to receive detected peripheral device enrollment data describing an introduced peripheral device node that has requested to be operatively coupled to an anchor information handling system node within a peripheral device workspace, the anchor information handling system node operatively coupled to the peripheral device workspace cloud orchestrator server and identified as being included within the peripheral device workspace. The hardware processor executed computer-readable program code of a node attestation service module to attest whether the introduced peripheral device node is a trusted node based on the received peripheral device enrollment data. The hardware processor executes computer-readable program code of a node authorization service module to provide operational entitlements that define the actions allowed by the introduced peripheral device node.
SYSTEM AND METHOD FOR OPERATIVELY COUPLING PERIPHERAL DEVICES WITHIN A PERIPHERAL DEVICE WORKSPACE ACCORDING TO COMMUNICATION PROTOCOL BEST SUITED FOR DEVICE CAPABILITIES
A peripheral device workspace cloud orchestrator may comprise a network interface device to receive telemetry readings describing a current usage pattern for an information handling system, available communication protocols at a location for linking the information handling system and a peripheral device, and communication protocol-dependent functional capabilities for the peripheral device operatively coupled to the information handling system at the location to form a peripheral device workspace, and a hardware processor to execute code instructions for the peripheral device workspace cloud orchestrator to instruct the information handling system to operatively couple to the peripheral device using a best-suited communication protocol for selected performance from communication protocol-dependent functional capability data for the peripheral device under the current usage pattern for executing software application on an anchor information handling system node or peripheral device workspace environmental telemetry readings.
H04W 24/04 - Configurations pour maintenir l'état de fonctionnement
87.
SYSTEM AND METHOD FOR ADAPTIVE CONFIGURATION AND FIRMWARE UPDATE OWNERSHIP ACROSS NODES OF A PERIPHERAL DEVICE WORKSPACE BASED ON REAL-TIME ASSESSMENT OF NODE CAPABILITIES AND CAPACITY
A peripheral device workspace cloud orchestrator information handling system comprises a network interface device to receive maximum and current hardware resource availabilities and for a first anchor information handling system node and other peripheral device nodes operatively coupled at an identified location to form a defined peripheral device workspace that also includes a second information handling system node or a smart peripheral device node, and a hardware processor to execute code instructions to determine a ranking score for the first and second information handling systems, and smart peripheral device, based on the maximum and current hardware resource availabilities to determine which one of the second information handling system or the smart peripheral device associated with a highest ranking score is to transition to implement transmitted peripheral device operational configuration policies or firmware or software updates at each of the plurality of peripheral devices.
A peripheral device workspace cloud orchestrator server includes a hardware processor and a network interface device to receive quality of experience (QoE) values associated with a plurality of device nodes within a workspace. The hardware processor executes computer-readable program code of a peripheral device workspace telemetry module to save the QoE values, user identification data, and node device data on a cloud orchestrator database. The hardware processor executes the computer code of a peripheral device workspace telemetry module to request and receive upcoming user meetings and events associated with the user's use of the plurality of device nodes that are affected by the QoE values and generate unified workspace notifications that the QoE will be affected at one or more of the device nodes within the workspace and sending those unified workspace notifications to the anchor information handling system node within the workspace.
A system and method or operating a webcam with an information handling system comprising a webcam microcontroller, a memory device, and a webcam camera to capture images of a user's face, an adjustable, automated polarizer device having a stepper motor and a polarizer in a gear polarizer ring operatively coupled by a drive gear and arranged in front of an aperture for the webcam camera where the polarizer in the gear polarizer ring is rotatable to adjust a polarizer rotation orientation to reduce reflection in the images captured by the webcam camera, and the webcam microcontroller to execute computer-readable program code of an automated polarizer control system to adjust the rotation of the polarizer with the stepper motor based on a detected head angle of the user's face in the images captured by the webcam camera to reduce reflection in the images.
H04N 23/611 - Commande des caméras ou des modules de caméras en fonction des objets reconnus les objets reconnus comprenant des parties du corps humain
G02B 26/06 - Dispositifs ou dispositions optiques pour la commande de la lumière utilisant des éléments optiques mobiles ou déformables pour commander la phase de la lumière
H04N 23/52 - Éléments optimisant le fonctionnement du capteur d'images, p. ex. pour la protection contre les interférences électromagnétiques [EMI] ou la commande de la température par des éléments de transfert de chaleur ou de refroidissement
H04N 23/69 - Commande de moyens permettant de modifier l'angle du champ de vision, p. ex. des objectifs de zoom optique ou un zoom électronique
90.
SYSTEM AND METHOD FOR DETERMINING PERIPHERAL DEVICE CONFIGURATIONS ACROSS A PLURALITY OF WORKSPACES FOR SEAMLESS USER PERIPHERAL DEVICE WORKSPACE ECOSYSTEM EXPERIENCE
A peripheral device workspace cloud orchestrator information handling system comprises a network interface device to receive functional capabilities for an existing peripheral device previously operatively coupled by a user to a user information handling system anchor node for a peripheral device workspace defined by a manifest of included peripheral device nodes, location, and peripheral device workspace identification value, and a user composite peripheral device workspace identifier associated with an adjustable operational configuration instructing the existing peripheral device operation, a hardware processor to execute code instructions to identify new peripheral device capabilities within a received new device orchestrated device descriptor for a new peripheral device operatively coupled to the anchor node, determine a minimum percentage of the new peripheral device capabilities matches the existing functional capabilities, and instruct the anchor node to configure the new peripheral device according to the adjustable operational configuration associated with the existing peripheral device.
Techniques are disclosed for evaluating immutable ledger requests using a semantic taxonomy. An example system includes a memory comprising instructions, and a processor configured to execute the instructions. Example instructions include providing a semantic taxonomy of semantically linked terms and phrases; using the semantic taxonomy to validate input fields of requests for immutable ledger transactions according to one or more predefined templates; and submitting the validated requests to an immutable ledger.
Techniques are disclosed for unsupervised domain adaptation using prompt learning in edge devices. An example system includes a memory having instructions, and a processor communicatively coupled to the memory and configured to execute the instructions. Example instructions include: comparing statistics of data samples collected from an edge device against a plurality of known domain statistics to detect a new domain; using descriptions generated for the collected data samples to determine a pseudo label associated with the new domain, where the pseudo label is generated using unsupervised machine learning; and applying a domain adaptation process using prompt learning based on the new domain and on the associated pseudo label to generate new prompts usable with a machine learning multimodal model for the new domain, and to update the known domain statistics to include statistics of the new domain, where the multimodal model is trained on text similarity.
Distributed unit monitoring of radio unit transmitter performance (e.g., using a computerized tool), is enabled. For example, a system can comprise a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise determining an average of differences between respective uplink path losses between a cellular node and a group of user equipment, and corresponding downlink path losses between the cellular node and the group of user equipment. The operations can further comprise, in response to the average of the differences between the respective uplink path losses and the corresponding downlink path losses being determined to satisfy a defined difference threshold, determining that the cellular node is not transmitting according to a specified power level.
H04W 52/24 - Commande de puissance d'émission [TPC Transmission power control] le TPC étant effectué selon des paramètres spécifiques utilisant le rapport signal sur parasite [SIR Signal to Interference Ratio] ou d'autres paramètres de trajet sans fil
H04W 52/22 - Commande de puissance d'émission [TPC Transmission power control] le TPC étant effectué selon des paramètres spécifiques tenant compte des informations ou des instructions antérieures
94.
BIDIRECTIONAL ATTESTATION FOR WORKSPACE ORCHESTRATORS
Systems and methods for bi-directional attestation for workspace orchestrators are described. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: receive, from a workspace orchestrator, a request to attest a workspace component within a workspace instantiated by a client IHS; send an indication of the request to an attester within the workspace component; and receive attestation evidence from the attester, where the attestation evidence is signed with an attestation key.
H04L 41/5054 - Déploiement automatique des services déclenchés par le gestionnaire de service, p. ex. la mise en œuvre du service par configuration automatique des composants réseau
H04L 41/5041 - Gestion des services réseau, p. ex. en assurant une bonne réalisation du service conformément aux accords caractérisée par la relation temporelle entre la création et le déploiement d’un service
95.
WORKSPACE ORCHESTRATION WITH EPHEMERAL HARDWARE ATTESTATION
Systems and methods for workspace orchestration with ephemeral hardware attestation are described. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: transmit measurement data from a local management agent to a workspace orchestration service; receive, at the local management agent in response to attestation of the measurement data by the workspace orchestration service, a workspace definition configured to enable the local management agent to instantiate a workspace; and instantiate the workspace.
Systems and methods for secure communications between subordinate workspaces and third parties are described. In an illustrative, non-limiting embodiment, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the processor, cause the IHS to: transmit one or more files received from a workspace orchestration service to a peripheral device, where the one or more files enable the peripheral device to instantiate a subordinate workspace; and facilitate secure communications between the subordinate workspace and a third-party.
The technology described herein is directed towards a carrier aggregation system for a user equipment requesting simultaneous voice and data sessions. In one example, a classification model determines whether carrier aggregation, if used in conjunction with voice quality data, will likely result in acceptable or unacceptable voice quality for a user equipment, based on dynamic user equipment-related and cell-related input data. If voice quality is deemed acceptable by the model, carrier aggregation is allowed to be used simultaneously (and activated if not in use) with voice service. If voice quality is deemed unacceptable, carrier aggregation is not allowed to be used simultaneously with voice service, (and released if currently in use). Monitoring is performed to evaluate whether subsequent conditions (updated input data) change, such as if estimated voice quality degrades such that carrier aggregation is no longer allowed to continue when both carrier aggregation and voice are otherwise in use.
Systems and methods are provided for providing a vulnerability applicability module, wherein a context detector, a context detection output interpreter module and/or an executable may be included in a catalog of known vulnerabilities. An IHS remote access controller may detect publication of a catalog of known vulnerabilities and execute the context detector, the context detection output interpreter module and/or the executable included in the catalog. This causes the remote controller to identify configurations for one or more of the plurality of hardware components of the IHS, determine whether any of the one or more of the hardware component configurations are identified as vulnerable in the catalog of known vulnerabilities, and generate comprehensive applicability determination module, which upon execution by the IHS, determines configuration vulnerabilities in the catalog of known vulnerabilities that are present on the IHS for remediation.
A display device which includes a display component; a display frame; an embedded camera system, the embedded camera system including a camera component, the camera component being physically coupled to the display frame to embed the camera component within the display device and an electronic aperture component, the electronic aperture component being physically coupled to the display frame of the display device, the electronic aperture component providing a variable diameter opening, the variable diameter opening controlling an amount of light received by the camera component.
H04N 23/57 - Détails mécaniques ou électriques de caméras ou de modules de caméras spécialement adaptés pour être intégrés dans d'autres dispositifs
G02F 1/1333 - Dispositions relatives à la structure
G02F 1/167 - Dispositifs ou dispositions pour la commande de l'intensité, de la couleur, de la phase, de la polarisation ou de la direction de la lumière arrivant d'une source lumineuse indépendante, p. ex. commutation, ouverture de porte ou modulationOptique non linéaire pour la commande de l'intensité, de la phase, de la polarisation ou de la couleur basés sur le mouvement de translation des particules dans un fluide sous l’influence de l’application d’un champ caractérisés par l’effet électro-optique ou magnéto-optique par électrophorèse
G02F 1/1685 - Fonctionnement des cellules Dispositions de circuit affectant l’intégralité de la cellule
G03B 30/00 - Modules photographiques comprenant des objectifs et des unités d'imagerie intégrés, spécialement adaptés pour être intégrés dans d'autres dispositifs, p. ex. des téléphones mobiles ou des véhicules
H04N 23/75 - Circuits de compensation de la variation de luminosité dans la scène en agissant sur la partie optique de la caméra
100.
ENHANCED MANAGEMENT OF PERIODIC UPLINK DELAY SENSITIVE DATA TRAFFIC
Enhanced communication of uplink data associated with a device, with reduced uplink delay and reduced discarding of data packets, can be performed and managed. Base station can employ communication manager component (CMC) that can receive, from the device, uplink data packet delay information associated with communication of first uplink data packet from device to base station. Device can determine uplink data pack delay based on difference between a time the uplink data packet is generated and a time the uplink data packet is communicated in accordance with uplink grant. CMC can determine second time of second uplink grant for communication of second uplink data packet from device to base station, based on analysis of uplink data packet delay information, first time of first uplink grant for communication of first uplink data packet, uplink grant time period, and/or jitter information relating to jitter associated with communication of uplink data packets.
H04W 72/1268 - Jumelage du trafic à la planification, p. ex. affectation planifiée ou multiplexage de flux de flux de données en liaison ascendante
H04W 72/232 - Canaux de commande ou signalisation pour la gestion des ressources dans le sens descendant de la liaison sans fil, c.-à-d. en direction du terminal les données de commande provenant de la couche physique, p. ex. signalisation DCI
H04W 72/542 - Critères d’affectation ou de planification des ressources sans fil sur la base de critères de qualité en utilisant la qualité mesurée ou perçue