In a network discovery and management system, a machine learning (ML) DLAD processor trains, validates, updates, and stores machine learning models. A ML training data preparation program performs operations to process and format input data to generate ML training data that can be used to train ML models. ML training program uses the ML training data to train ML models, thereby generating trained ML models. The ML training program can re-train or update the training of ML models as the system collects additional data and produces additional estimates, predictions, and forecasts. ML model validation program performs validation testing on trained ML models to generate one or more metrics that can indicate accuracy of predictions generated by the trained models. The resulting ML model(s) can be used to manage the network including but not limited to retrieve, instantiate and execute dynamic applications based on predictions made based on the models.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software using a machine learning model and/or generative AI for use in root cause analysis, analysis of performance metrics for information technology infrastructure and computer network operations, and providing information, alerts and advice regarding performance of information technology infrastructure and computer network operations Software as a service (SAAS) and cloud-based computer services all featuring computer software using a machine learning model and/or generative AI for use in root cause analysis, analysis of performance metrics for information technology infrastructure and computer network operations, and providing information, alerts and advice regarding performance of information technology infrastructure and computer network operations
3.
Component detection and management using relationships
Correlation of component information provided by diverse detection and data collection methods is used to discover additional components and identify and record relationships between these and still other components. Each detection and data collection method can be individually useful to discover components, and to provide at least some information about one or more discovered components to identify at least one relationship between the discovered components. When the information and component discoveries of a first detection and data collection method are properly combined with those of a second detection and data collection method, there can be a synergistic effect that greatly improves the utility and efficiency of a relationship-based network management system by enabling automated discovery of additional components and identification of additional component relationships, by automatically merging diverse views of a single component into a coherent picture of that component, and by automated prediction of component state changes based on state changes in related components.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 41/04 - Network management architectures or arrangements
H04L 41/12 - Discovery or management of network topologies
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
4.
Component detection and management using relationships
Correlation of component information provided by diverse detection and data collection methods is used to discover additional components and identify and record relationships between these and still other components. Each detection and data collection method can be individually useful to discover components, and to provide at least some information about one or more discovered components to identify at least one relationship between the discovered components. When the information and component discoveries of a first detection and data collection method are properly combined with those of a second detection and data collection method, there can be a synergistic effect that greatly improves the utility and efficiency of a relationship-based network management system by enabling automated discovery of additional components and identification of additional component relationships, by automatically merging diverse views of a single component into a coherent picture of that component, and by automated prediction of component state changes based on state changes in related components.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 41/12 - Discovery or management of network topologies
H04L 41/04 - Network management architectures or arrangements
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
5.
System and method for the collection, generation, and distribution of synthetic metrics for computer system management
A system defines, creates, uses, and distributes information about other entities by collecting network information, recombining and synthesizing new network metrics from the collected network information, and then publishing one or more synthetic metrics datum describing the operation of the synthetic device, using a facading processing system. The technology herein has applications e.g., in the areas of network and computer systems management.
Systems, software, and methods for managing traditional (i.e., TCP/IP-based), non-traditional, and traditional-non-traditional hybrid networks of connected electronic devices are described. In one example, network management policy and network management applications are downloaded automatically upon detection and identification of a new device, application or service on a network. In another example, information related to at least one aspect of the network is obtained by a network management device through connection to a non-TCP/IP network, or by way of a gateway device or application, at least one applicable management policy is identified, and the identified policy is used to manage at least one aspect of the network's operation. In another example, devices, applications or services presenting various behaviors under various scenarios are evaluated and placed under management.
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
In a network discovery and management system, a machine learning (ML) DLAD processor trains, validates, updates, and stores machine learning models. A ML training data preparation program performs operations to process and format input data to generate ML training data that can be used to train ML models. ML training program uses the ML training data to train ML models, thereby generating trained ML models. The ML training program can re-train or update the training of ML models as the system collects additional data and produces additional estimates, predictions, and forecasts. ML model validation program performs validation testing on trained ML models to generate one or more metrics that can indicate accuracy of predictions generated by the trained models. The resulting ML model(s) can be used to manage the network including but not limited to retrieve, instantiate and execute dynamic applications based on predictions made based on the models.
Correlation of component information provided by diverse detection and data collection methods is used to discover additional components and identify and record relationships between these and still other components. Each detection and data collection method can be individually useful to discover components, and to provide at least some information about one or more discovered components to identify at least one relationship between the discovered components. When the information and component discoveries of a first detection and data collection method are properly combined with those of a second detection and data collection method, there can be a synergistic effect that greatly improves the utility and efficiency of a relationship-based network management system by enabling automated discovery of additional components and identification of additional component relationships, by automatically merging diverse views of a single component into a coherent picture of that component, and by automated prediction of component state changes based on state changes in related components.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 41/12 - Discovery or management of network topologies
H04L 41/04 - Network management architectures or arrangements
H04L 43/08 - Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
9.
System and method for the collection, generation, and distribution of synthetic metrics for computer system management
A system defines, creates, uses, and distributes information about other entities by collecting network information, recombining and synthesizing new network metrics from the collected network information, and then publishing one or more synthetic metrics datum describing the operation of the synthetic device, using a facading processing system. The technology herein has applications e.g., in the areas of network and computer systems management.
A system defines, creates, uses, and distributes information about other entities by collecting network information, recombining and synthesizing new network metrics from the collected network information, and then publishing one or more synthetic metrics datum describing the operation of the synthetic device, using a facading processing system. The technology herein has applications e.g., in the areas of network and computer systems management.
In a network discovery and management system, a machine learning (ML) DLAD processor trains, validates, updates, and stores machine learning models. A ML training data preparation program performs operations to process and format input data to generate ML training data that can be used to train ML models. ML training program uses the ML training data to train ML models, thereby generating trained ML models. The ML training program can re-train or update the training of ML models as the system collects additional data and produces additional estimates, predictions, and forecasts. ML model validation program performs validation testing on trained ML models to generate one or more metrics that can indicate accuracy of predictions generated by the trained models. The resulting ML model(s) can be used to manage the network including but not limited to retrieve, instantiate and execute dynamic applications based on predictions made based on the models.
In a network discovery and management system, a machine learning (ML) DLAD processor trains, validates, updates, and stores machine learning models. A ML training data preparation program performs operations to process and format input data to generate ML training data that can be used to train ML models. ML training program uses the ML training data to train ML models, thereby generating trained ML models. The ML training program can re-train or update the training of ML models as the system collects additional data and produces additional estimates, predictions, and forecasts. ML model validation program performs validation testing on trained ML models to generate one or more metrics that can indicate accuracy of predictions generated by the trained models. The resulting ML model(s) can be used to manage the network including but not limited to retrieve, instantiate and execute dynamic applications based on predictions made based on the models.
Correlation of component information provided by diverse detection and data collection methods is used to discover additional components and identify and record relationships between these and still other components. Each detection and data collection method can be individually useful to discover components, and to provide at least some information about one or more discovered components to identify at least one relationship between the discovered components. When the information and component discoveries of a first detection and data collection method are properly combined with those of a second detection and data collection method, there can be a synergistic effect that greatly improves the utility and efficiency of a relationship-based network management system by enabling automated discovery of additional components and identification of additional component relationships, by automatically merging diverse views of a single component into a coherent picture of that component, and by automated prediction of component state changes based on state changes in related components.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 12/24 - Arrangements for maintenance or administration
Correlation of component information provided by diverse detection and data collection methods is used to discover additional components and identify and record relationships between these and still other components. Each detection and data collection method can be individually useful to discover components, and to provide at least some information about one or more discovered components to identify at least one relationship between the discovered components. When the information and component discoveries of a first detection and data collection method are properly combined with those of a second detection and data collection method, there can be a synergistic effect that greatly improves the utility and efficiency of a relationship-based network management system by enabling automated discovery of additional components and identification of additional component relationships, by automatically merging diverse views of a single component into a coherent picture of that component, and by automated prediction of component state changes based on state changes in related components.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 12/24 - Arrangements for maintenance or administration
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software for use in data and database management, access, exploration, visualization and storage Software as a service (SAAS) and cloud-based computer services all featuring computer software for use in data and database management, access, exploration, visualization and storage
17.
Network management device and method for discovering and managing network connected databases
Systems, software, and methods for managing traditional (i.e., TCP/IP-based), non-traditional, and traditional-non-traditional hybrid networks of connected electronic devices are described. In one example, network management policy and network management applications are downloaded automatically upon detection and identification of a new device, application or service on a network. In another example, information related to at least one aspect of the network is obtained by a network management device through connection to a non-TCP/IP network, or by way of a gateway device or application, at least one applicable management policy is identified, and the identified policy is used to manage at least one aspect of the network's operation. In another example, devices, applications or services presenting various behaviors under various scenarios are evaluated and placed under management.
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 41/026 - Exchanging or transporting network management information using the InternetEmbedding network management web servers in network elementsWeb-services-based protocols using e-messaging for transporting management information, e.g. email, instant messaging or chat
H04L 41/0273 - Exchanging or transporting network management information using the InternetEmbedding network management web servers in network elementsWeb-services-based protocols using web services for network management, e.g. simple object access protocol [SOAP]
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
H04L 41/0826 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for reduction of network costs
H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
H04L 41/5074 - Handling of user complaints or trouble tickets
18.
Dynamically deployable self configuring distributed network management system
Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are transferred automatically upon detection and identification of a new device, protocol or application on the network. In another example, information related to at least one aspect of the network is obtained by an NMAS, and at least one applicable management policy is identified by the NMAS; and the identified policy is used to manage at least one aspect of the network's operation.
G06F 12/08 - Addressing or allocationRelocation in hierarchically structured memory systems, e.g. virtual memory systems
19.
Dynamically deployable self configuring distributed network management system and method having execution authorization based on a specification defining trust domain membership and/or privileges
Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are transferred automatically upon detection and identification of a new device, protocol or application on the network. In another example, information related to at least one aspect of the network is obtained by an NMAS, and at least one applicable management policy is identified by the NMAS; and the identified policy is used to manage at least one aspect of the network's operation.
Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are transferred automatically upon detection and identification of a new device, protocol or application on the network. In another example, information related to at least one aspect of the network is obtained by an NMAS, and at least one applicable management policy is identified by the NMAS; and the identified policy is used to manage at least one aspect of the network's operation.
G06F 12/08 - Addressing or allocationRelocation in hierarchically structured memory systems, e.g. virtual memory systems
21.
Dynamically deployable self configuring distributed network management system using a trust domain specification to authorize execution of network collection software on hardware components
Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are transferred automatically upon detection and identification of a new device, protocol or application on the network. In another example, information related to at least one aspect of the network is obtained by an NMAS, and at least one applicable management policy is identified by the NMAS; and the identified policy is used to manage at least one aspect of the network's operation.
Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are transferred automatically upon detection and identification of a new device, protocol or application on the network. In another example, information related to at least one aspect of the network is obtained by an NMAS, and at least one applicable management policy is identified by the NMAS; and the identified policy is used to manage at least one aspect of the network's operation.
Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are downloaded automatically upon detection and identification of a new device on the network. In another example, information related to at least one aspect of the network is obtained by a network management device, and at least one applicable management policy is identified by the device; and the identified policy is used to manage at least one aspect of the network's operation.
Correlation of component information provided by diverse detection and data collection methods is used to discover additional components and identify and record relationships between these and still other components. Each detection and data collection method can be individually useful to discover components, and to provide at least some information about one or more discovered components to identify at least one relationship between the discovered components. When the information and component discoveries of a first detection and data collection method are properly combined with those of a second detection and data collection method, there can be a synergistic effect that greatly improves the utility and efficiency of a relationship-based network management system by enabling automated discovery of additional components and identification of additional component relationships, by automatically merging diverse views of a single component into a coherent picture of that component, and by automated prediction of component state changes based on state changes in related components.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 12/24 - Arrangements for maintenance or administration
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer and technical support services, namely, remote and on-site monitoring and management of cloud computing information technology and application systems of others.
26.
Method of increasing capacity to process operational data
A first-system has a plurality of interconnected computers which receive operational data from remote data sources. The first-system has a software application for processing the operational data received from remote data sources and the operational data characterizes performance of one or more software applications running on the remote data sources. A load capacity “L” for the first-system is determined; wherein L is the number of remote data sources that can be processed before the system becomes overloaded. The first-system is repeatedly monitors remote data sources to determine their number. When the number of remote data sources exceeds a predetermined fraction of L the first-system is replicated and replications are installed. When a client requests data from one of the systems, using a time stamp the data is automatically provided. The first-system is replicated as more processing power is required conditional upon the load capacity of the system.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software for database management in the field of customer management; security software for monitoring networks and computer network management software, all for use by small, medium, and large businesses. Computer software design and development for others and ongoing technical support services in the nature of troubleshooting of computer software problems for small, medium and large businesses all in the fields of entity management, network management, customer management, sophisticated security alerting and automatic computing software solutions.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Computer software for database management in the field of customer management; security software for monitoring networks and computer network management software, all for use by small, medium, and large businesses Computer software design and development for others and ongoing technical support services in the nature of troubleshooting of computer software problems for small, medium and large businesses all in the fields of entity management, network management, customer management, sophisticated security alerting and automatic computing software solutions
29.
System and method for information extraction from within an active application during execution
A system and method for providing detailed information about how a software application is running has a processor and memory including a shared memory. The method provides an automated way of extracting information from a first software application having a plurality of libraries as the application executes. A special library used to interrogate an execution application is placed in the execution path but does not use I/O resources while it is extracting information about an executing software application. An intercept causes the special library to execute, and information is seamless provided to an output device during execution of the interrogated application.
Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are transferred automatically upon detection and identification of a new device, protocol or application on the network. In another example, information related to at least one aspect of the network is obtained by an NMAS, and at least one applicable management policy is identified by the NMAS; and the identified policy is used to manage at least one aspect of the network's operation.
Systems, software, and methods for managing traditional (i.e., TCP/IP-based), non-traditional, and traditional-non-traditional hybrid networks of connected electronic devices are described. In one example, network management policy and network management applications are downloaded automatically upon detection and identification of a new device, application or service on a network. In another example, information related to at least one aspect of the network is obtained by a network management device through connection to a non-TCP/IP network, or by way of a gateway device or application, at least one applicable management policy is identified, and the identified policy is used to manage at least one aspect of the network's operation. In another example, devices, applications or services presenting various behaviors under various scenarios are evaluated and placed under management.
Systems, software, and methods for managing networks of connected electronic devices are described. In one example, network management policy and network management applications are downloaded automatically upon detection and identification of a new device on the network. In another example, information related to at least one aspect of the network is obtained by a network management device, and at least one applicable management policy is identified by the device; and the identified policy is used to manage at least one aspect of the network's operation.