Abstract:
Data in a database cache in memory of an operating database server is copied to memory of a standby database server, without requiring synchronization between the operating server and the standby server. If the operating server fails, the database is recovered to a consistent state in the standby server using a sequential database log and the copied data in the cache of the standby server. Preferably, recovery is performed by reading the log to determine a set of database actions to recover, verifying blocks of data in the standby server's cache, using verified blocks to recover at least some actions, and reading blocks from storage only when a corresponding verified block is not available in the cache.
Abstract:
Systems and methods for alerting a driver to a status of a traffic signal are disclosed. A computer-implemented method includes: detecting, by a computing device, that a vehicle is stopped at an intersection with a traffic signal; determining, by the computing device, an attention focus area of a driver of the vehicle; determining, by the computing device, a target display device based on the determined attention focus area; and causing, by the computing device, the determined target display device to display information to alert the driver of a status of the traffic signal.
Abstract:
Systems, methods and tools for improving healthcare communication between physicians and patients by utilizing audio recordings systems capable of collecting voice data of patient conversations with healthcare providers. The communication system converts the recorded voice data into text using voice to text conversion software, analyzes the voice data using a natural language processor to parse for key words and phrases relating to the patient's health and concerns. Voice data may be additionally analyzed by cognitive analysis systems and machine learning algorithms designed to identify the sentiment that the patient is portraying while discussing the patient's concerns about health-related experiences or symptoms and cross-referenced with social media and other external websites or applications, confirming a patient's sentiment or providing additional key words and phrases unraised by the patient when communicating with the physician.
Abstract:
Data in a database cache in memory of an operating database server is copied to memory of a standby database server, without requiring synchronization between the operating server and the standby server. If the operating server fails, the database is recovered to a consistent state in the standby server using a sequential database log and the copied data in the cache of the standby server. Preferably, recovery is performed by reading the log to determine a set of database actions to recover, verifying blocks of data in the standby server's cache, using verified blocks to recover at least some actions, and reading blocks from storage only when a corresponding verified block is not available in the cache.
Abstract:
A method, system, and program product is provided for reducing redundant validations for live operating system migration. A control point caches at least one validation inventory that is associated with a logical partition (LPAR). The control point sends the cached validation inventory to a virtualization manager upon an activation of the LPAR associated with the validation inventory. The control point invalidates the cached validation inventory upon notification from the virtualization manager that the validation inventory is changed and is no longer valid. The control point re-validates the validation inventory.
Abstract:
A processor may receive an indication form a radio frequency identification (RFID) device that a mobile device is in a predetermined area. The processor may send a private key on a first frequency at a first time to the mobile device. The processor may receive a communication request from the mobile device that may contain a public decryption key. The processor may send encrypted configuration information and encrypted state information to the mobile device. In some embodiments, an RFID device, may identify that a mobile device is within a predetermined area. The RFID device may send a tag to the mobile device. The RFID may send a notification to a communicator that the tag has been sent. The RFID may acquire the encrypted configuration information and encrypted state information form the communicator. The RFID device may push the encrypted configuration information and the encrypted state information to the mobile device.
Abstract:
A processor may receive an indication form a radio frequency identification (RFID) device that a mobile device is in a predetermined area. The processor may send a private key on a first frequency at a first time to the mobile device. The processor may receive a communication request from the mobile device that may contain a public decryption key. The processor may send encrypted configuration information and encrypted state information to the mobile device. In some embodiments, an RFID device, may identify that a mobile device is within a predetermined area. The RFID device may send a tag to the mobile device. The RFID may send a notification to a communicator that the tag has been sent. The RFID may acquire the encrypted configuration information and encrypted state information form the communicator. The RFID device may push the encrypted configuration information and the encrypted state information to the mobile device.
Abstract:
Data in a database cache in memory of an operating database server is copied to memory of a standby database server, without requiring synchronization between the operating server and the standby server. If the operating server fails, the database is recovered to a consistent state in the standby server using a sequential database log and the copied data in the cache of the standby server. Preferably, recovery is performed by reading the log to determine a set of database actions to recover, verifying blocks of data in the standby server's cache, using verified blocks to recover at least some actions, and reading blocks from storage only when a corresponding verified block is not available in the cache.
Abstract:
A computer-implemented method includes receiving a request. The request is for an alarm. The alarm is emitted from a mobile device. The mobile device is powered by a battery. The battery has a battery level. The method includes receiving a battery level threshold. The method is responsive to the battery level being below the battery level threshold. The method includes identifying an alternative alarm device. The alternative alarm device is enabled with an electronic control channel. The method includes generating an alternative alarm. The method includes sending the alternative alarm to the alternative alarm device via the electronic control channel.
Abstract:
A computer program product for prioritizing First Failure Data Capture (FFDC) data for analysis. A processor configured to: identify, by the processor, FFDC data in response to receiving an error message, the FFDC data comprising at least one of: a computer system event which may lead to system failure; a computer system event led to system failure; a computer system condition which may lead to system failure; a computer system condition which led to system failure; determine, by the processor, a relevancy rank for each data value in the FFDC data based on the error message received and a probability a given data value is relevant in resolving a cause of the error message; and send, by the processor, in order of relevancy, the data values of the FFDC data to a second server.