Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

135 results about "Critical event" patented technology

Method for managing resource assets for emergency situations

A method for collecting, organizing, presenting, and using data relative to the scene of an emergency situation is disclosed. The method uses a Responder Assets Management System (RAMS) composed of four modules including information, logistics, operations, and planning. The information module makes general information immediately available to responders. The logistics module assists in managing equipment resources during a contingency and includes an equipment manager interface for managing equipment used to respond to an emergency situation. The operations module supports daily operations responsibilities and scales to handle significant emergencies and includes at least one of a situational awareness interface, a response options generator (ROG) interface, an operations manager interface, a messenger interface and a status board interface. The situational awareness interface is designed for emergency and crisis response managers to provide enhanced, community-wide situational awareness using full immersion, spherical images, Geographic Information System (GIS) maps, site and floor plans, and a database interface to provide virtual walk-through, pre-incident plans, for contingency planning, training visualization, and operational support. The ROG interface provides automated response and resource estimates to decision-makers in command posts and on-site in developing a response to significant, unplanned events. The operations manager interface is used by a remote headquarters to monitor an on-going operation. The messenger interface is a pre-formatted, topic oriented messaging system that supports both informational messages and messages that automatically update system data and displays. The status board interface is a situation display of key situational awareness data. The planning module assists users in planning for critical events.
Owner:RAMSAFE TECH

Method and apparatus for deterministic replay of java multithreaded programs on multiprocessors

A method (and apparatus) of determinstically replaying an observable run-time behavior of distributed multi-threaded programs on multiprocessors in a shared-memory multiprocessor environment, wherein a run-time behavior of the programs includes sequences of events, each sequence being associated with one of a plurality of execution threads, includes identifying an execution order of critical events of the program, wherein the program includes critical events and non-critical events, generating groups of critical events of the program, generating, for each given execution thread, a logical thread schedule that identifies a sequence of the groups associated with the given execution thread, and storing the logical thread schedule for subsequent reuse.
Owner:IBM CORP

System and method for semi-distributed event warning notification for individual entities, and computer program product therefor

An information system, method, and computer program product is provided for the semi-distributed warning of existing or developing significant events and/or threats to all network bridges in the system, and then to affected users carrying a user warning and positioning device, while reporting the location of all user's carrying the user warning and positioning devices of the system to existing command and control systems. The present invention's future event warning capabilities permit those same users to be warned of impending events in enough time for the users to take positive actions in response to these events and/or address those events. The system of the present invention includes a pager-like user warning and positioning device, worn by or carried by the individual user, or mounted in a vehicle or vessel, having a geographical positioning means therein, which periodically transmits the geographical location of the individual user, vehicle or vessel to local network bridges, and listens for warning/notification event messages transmitted by the local network bridge. When an event/threat warning is received by an affected user warning and positioning device, the pager-like user warning and positioning alerts the user via indicia relative to the event/situation, including audible spoken warnings and instructions on how to react, and may retransmit the event/threat warning to other user warning and positioning devices in the network, provided the threat has not occurred and the event/threat warning has not been previously relayed.
Owner:UNITED STATES OF AMERICAS AS REPRESENTED BY THE UNITED STATES OF AMERICA THE +1

Road safety warning system and method

An in-vehicle system for tracking events that occur at specific locations of a transportation route and alerting a driver of an impending significant event includes a location determination unit for determining an instantaneous location of the vehicle, and an event determination unit coupled to the location determination unit and responsive to the instantaneous location of the vehicle for communicating with an events database for obtaining an impending traffic sign that the vehicle is about to confront based on the vehicle's instantaneous location. A decision module coupled to the event determination unit is responsive to current parameters of the vehicle for determining whether the current parameters of the vehicle are conducive to safe driving based on the impending event, and a warning unit coupled to the decision module is responsive to at least one current parameter of the vehicle not being conducive to safe driving for alerting the driver of the impending event.
Owner:SHIRI YOSSEF

Fault tree map generation

A method for Fault Tree Map generation employs to transformation of Fault Trees of production installation, specific installation, technical system (Hardware and integrated Hardware / Software) to new Fault Tree diagram (Fault Tree Map), which permits drastically compact the Fault Tree depiction and facilitates performing of the Fault Tree qualitative analysis, including evaluation of combination of latent failures and evident failures, repeated events and critical events position influence, and failure propagation potentiality, besides facility of localization of each Fault Tree logical Gate and relevant failures in the fault tree printed report. Generation takes place using special symbols, which permit to reflect the Fault Tree logic, present all Fault Tree failures with graphically identification of the failure type, and show the failure repetition and also the failure critically (importance) to Fault Tree Top Event probability. The method presents exceptional advantages to analysis of large-scale, extended Fault Trees, allowing vastly decrease the time of analysis and elevate the analysis quality and Fault Tree perception, including for specialists, who are not the Fault Tree authors.
Owner:EMBRAER SA

Indirect monitoring and reporting of a user's credit data

Methods and systems of monitoring and reporting of changes to a user's credit data are provided. One embodiment includes providing a service, hosted by a data server, that allows the user to access the service via a communication terminal. The service may also request enrollment data, including identity verification data, from the user. Further, the service may periodically access and monitor the user's credit data for a change in the user's credit data via a connection between the data server and a credit bureau even if the data server has not received sufficient identity verification data from the user. Additionally, the service may determine whether a change detected in the user's credit data is a significant event. When an event or a significant event in the user's credit data is detected, the service may alert the user of the fact that an event has occurred even if the data server has not received sufficient identity verification data from the user.
Owner:CONSUMERINFO COM

Dynamically drilling-down through a health monitoring map to determine the health status and cause of health problems associated with network objects of a managed network environment

User-configurable group views allow an administrator of a managed network, upon noticing that an icon is indicative of a critical event having occurred, as reflected in the color, shape, or other such indicator of the icon, to “drill down” to the network device or service that is the subject of the critical event and to then view an event or trap message associated with the critical event that is stored as a field of the network device or service effected by the critical event.
Owner:HEWLETT-PACKARD ENTERPRISE DEV LP

Hardware/software based indirect time stamping methodology for proactive hardware/software event detection and control

An improved method and apparatus for time stamping events occurring on a large scale distributed network uses a local counter associated with each processor of the distributed network. Each counter resets at the same time globally so that all events are recorded with respect to a particular time. The counter is stopped when a critical event is detected. The events are masked or filtered in an online or offline fashion to eliminate non-critical events from triggering a collection by the system monitor or service / host processor. The masking can be done dynamically through the use of an event history logger. The central system may poll the remote processor periodically to receive the accurate counter value from the local counter and device control register. Remedial action can be taken when conditional probability calculations performed on the historical information indicate that a critical event is about to occur.
Owner:IBM CORP

System and method for tactical distributed event warning notification for individual entities, and computer program product therefor

An information system, method, and computer program product is provided for the distributed warning of existing or developing significant events and/or threats to users carrying a user warning and positioning device, while reporting the location of all user's carrying the user warning and positioning devices of the system to existing command and control systems. The present invention's future event warning capabilities permit those same users to be warned of impending events in enough time for the users to take positive actions in response to these events and/or address those events. The system of the present invention includes a pager-like user warning and positioning device, worn by or carried by the individual user, or mounted in a vehicle or vessel, having a geographical positioning means therein, which periodically transmits the geographical location of the individual user, vehicle or vessel, and listens for warning/notification event messages transmitted by a network bridge or situational awareness workstation (central processing means). When an event/threat warning is received by the user warning and positioning device, the pager-like user warning and positioning alerts the user via indicia relative to the event/situation, including audible spoken warnings and instructions on how to react, and may retransmit the event/threat warning to other user warning and positioning devices in the network, provided the threat has not occurred and the event/threat warning has not been previously relayed.
Owner:UNITED STATES OF AMERICA AS REPRESENTED BY THE UNITED STATES OF AMERICA THE +1

System and method for distributed network acess and control enabling high availability, security and survivability

A system, method and computer program that administers access and security on a network having more than one computer system connected thereto. This system, method and computer program has a local password file (1500) which is one-way encrypted and contains user identifications, associated one-way encrypted passwords and associated privileges for each authorized user allowed access to the wide area network (10). A user login module (1200) is used to receive a user identification or role and password from a user and login the user when a match is found in the local password file (1500). A channel monitoring and filtering module (1000) is provided to monitor and receive broadcast or multicast messages within the wide area network (10) and display the message to the user when the user's associated privileges permit the viewing of the message. This system, method and computer program also has a password management module (1300) to update and insure that all the computers in the network contain the same local password file (1500). A remote auditing module (1400) is provided to monitor and process anomalous events which may occur on a user's computer. A remote control module is also provided to enable a systems administrator or security officer to take appropriate action when a critical event transpires. An authentication module is also provided to enable a system administrator or security officer an option to check and confirm a password entered by a user for re-authentication.
Owner:NORTHROP GRUMMAN SYST CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products