[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

GB2424086A - Monitoring computer system software - Google Patents

Monitoring computer system software Download PDF

Info

Publication number
GB2424086A
GB2424086A GB0420423A GB0420423A GB2424086A GB 2424086 A GB2424086 A GB 2424086A GB 0420423 A GB0420423 A GB 0420423A GB 0420423 A GB0420423 A GB 0420423A GB 2424086 A GB2424086 A GB 2424086A
Authority
GB
United Kingdom
Prior art keywords
value
message
probe
metric
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0420423A
Other versions
GB0420423D0 (en
Inventor
Michael P Coppert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Game Technology
Original Assignee
International Game Technology
Acres Gaming Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Game Technology, Acres Gaming Inc filed Critical International Game Technology
Priority to GB0420423A priority Critical patent/GB2424086A/en
Publication of GB0420423D0 publication Critical patent/GB0420423D0/en
Publication of GB2424086A publication Critical patent/GB2424086A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • G06F11/3072Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting
    • G06F11/3082Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting the data filtering being achieved by aggregating or compressing the monitored data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Hardware Design (AREA)
  • Debugging And Monitoring (AREA)

Abstract

A probe 125, 130, 135 detennines a value for a metric for a site 110, 115, 120. A message is generated including the value for the metric, and is delivered to a monitoring apparatus 140 at a central (or remote) site 105. The monitoring apparatus determines if the value is acceptable, based on the metric and possibly the site that the probe is monitoring. If the value is not acceptable, then the monitoring apparatus displays an alert to a possible problem.

Description

METHOD AND APPARATUS FOR MONITORING AN]) UPDATING SYSTEM SOFrWARE
FIELD OF THE INVENTION
This invention pertains to monitoring software for a variety of conditions such as internal performance characteristics, liability warnings, programmatic errors and the general health of the computer system.
BACKGROUND OF TIlE INVENTION
No matter the computer program, it is inevitable that there will be some bugs (that is, coding errors that caus the program to behave differently what is expected). Production environments represent a number of variables that are difficult to reproduce in testing environments. As such, applications with thousands of interfaces can fail under a variety of changing variables.
Because human intervention is required to maintain these applications, certain tasks must be completed by operations on a timely basis. Failure to operate and maintain the system withifl the published guidelines for the application will result in a number of unacceptable issues. These include, but are not limited to the following: inaccurate reporting of revenues; increased risks associated with liability; increased risks with system availability; and increased costs due to additional manpower correction activities.
Customers want to know that their mission critical system is perfonning at peak levels of performance. They want to know when an area of the system is failing. They need to feel confident that the system and its integration with operations are running smoothly. Not knowing the health of the internal components of the system can create a false sense of security Another thing software companies sometimes do to eliminate defects is to find out about defects from customers. For a long time, customers had to make contact with the software companies (either by telephone or by e-mail) and let the software companies know about the bugs More recently, as exemplified by Microsoft Windows XP, the operating system offers to send an error report to the software company when a program crashes. That Page 1 way, the software company is informed about serious errors. (Microsoft and Windows are registered trademarks of Microsoft Corporation in the United States and other countries.) Some third party products that monitor the operation of systems from the outside exist. For example, Netcool, by Micromuse, collects information from APIs, log files, and other utilities, and forwards this information to a server for filtering. Patrol, by BMC Software, offers remote monitoring arid full-application management. But both of these -products are external to the applications being monitored. These products focus primarily on external environments surrounding the application. They cannot detect the internal health of the application itself and thus their reporting value is limited in scope.
A need remains for a way to proactively detect application problems and software defects through monitoring internal application performance beyond that associated with the
prior art.
SUMMARY OF THE INVENTION
The invention is an apparatus, system, and method for monitoring computers. A series of probes residing on a customer's computer determines values for metrics and sends these values to a monitoring apparatus. The monitoring apparatus determines if the values for the metrics are acceptable. if the values for the metrics are not acceptable, then an alert is displayed so that a corrective measures can be initiated.
The foregoing and other features, objects, and advantages of the invention will become more readily apparent from the following detailed description, which proceeds with reference to the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 shows a central server with a monitoring apparatus, communicatmg with probes on customer computers, according to an embodiment of the invention.
FIG'. 2 shows details of the monitoring apparatus of FTC. 1.
FIG. 3 shows details of the probes of FIG. 1.
FIG. 4 show the probes of FIG. 1 communicating with the monitoring apparatus of FIG. 1.
FIG 5 shows a flowchart of the procedure for using the probes of FIG. 1.
FIGs. 6A-6C show a flowchart of the procedure for using the monitonng apparatus of FIG. I. Page 2
DETAILED DES CRIPTION OF THE PREFERRED EMBODIMENT
FIG. 1 shows a central server with a monitoring apparatus, communicating with probes on customer computers, according to an embodiment of the invention. In FIG. 1, server 105 is a central server. Server 105 is operated by the company distributing software products to its customers. Customers operate, for example, computers 110, 115, and 120 Although a person skilled in the art will recognize that there can be more or fewer than three customers, and that each customer can have more than one computer Installed on computers 110, 115, and 120 are probes 125, 130, and 135. Probes 125, 130, and 135 are responsible for determining the values associated with various metrics on computers 110, I 15, and 120 respectively, and transmitting these values back to server 105.
The details ofptobcs 125, 130, and 135 are discussed further with reference to FIGs. 3-4 below.
Server 105 includes monitoring apparatus 140. Monitoring apparatus 140 receives information from probes 125, 130, and 135, and detennines whether the data received from the probes represent acceptable values. If the values are acceptable, then monitoring apparatus 140 logs the values. Otherwise, monitoring apparatus displays 140 an alert, indicating the unacceptable value. The details of monitoring apparatus 140 are thscnssed further with reference to FIG. 2 below.
Connecting server 105 with computers 110, 115, and 120 is network 145. Network can be any variety of network including, among others, a local area network (LAN), a wide area network (WAN), a global network (such as the Internet), and a wireless network (for example, using Bluetooth or any of the IEEE 802.11 standards). In addition, a person skilled in the art will recognize that different networks can be used to connect server 105 with different computers. For example, server 105 might be connected to computer 110 using one network, and to computers 115 and 120 using a second network.
FIG. 2 shows details of the monitoring apparatus of FIG. 1. Monitoring apparatus includes four components: receiver 205, tester 210, alerter 215, and log 220. Receiver 205 is responsible for receiving a message from a probe and parsing the message for the necessary information. Tester 210 then tests the value (or values) retrieved from the message received by receiver 205 to determine if the value is acceptable. Alerter 215 displays an. alert is the value retrieved from the message is not acceptable. And log 220 includes entries, like Page 3 entry 225, which reflect the received message, its values, andlor whether the value is
acceptable.
To determine whether a value is acceptable, monitoring apparatus 140 uses database 230. Database 230 includes filters, such as filters 235, 240, and 245, which identify what values are considered acceptable. Different filters exist for different metrics. For example, filter 235 is a filter for the number of transactions occurring at a given location, whereas filter 245 is a filter for the number of open days experienced at a location.
Some filters, such as filter 245, can be used for all casino locations. But other metrics, such as the numbcr of transactions, can vary from one location to another. To account for differing interpretations of acceptable values, different filters can be set up for a single mctrtc, each filter identifying acceptable values for a different casino location. Thus, while filters 235 and 240 both represent acceptable values for the transactions metric, they represent acceptable values for different casinos.
Although a different filter can be set up for each different site for a given metric, the amount of variation in acceptable values might be limited. Where two or more sites agree on what constitutes an acceptable value for a given metric, there is no need for each site to have a separate filter. Thus, while FIG. 2 shows filters 235 and 240 being used for individual sites, a person skilled in the art will recognize that a single filter can be used for some (but not necessarily all) sites.
To select the appropriate filter, monitoring apparatus 140 uses selector 250. Selector 250 uses information tiom the message to select the appropriate metric. Selector 250 determines the metric represented in the message and, if necessary, the site from which the metric was measured. Selector 250 then uses these pieces of information to find the appropriate filter in database 230, so that tester 210 can determine if the value is acceptable.
FIG. 3 shows details of the probes of FIG. 1. In FIG. 3, probe 125 includes sensors 305, 310, and 315. Each sensor operates to determine values for different metrics for computer 110. For example, sensor 305 determines the number of transactions that occur in a given day in database 320 on computer 110, sensor 310 determines the number of open days at the site, and sensor 315 determines the number of fixes applied to software 325 on computer 110. A person skilled in the art will recognize that although three sensors are shown within probe 125, there can be fewer or more sensors in a given probe. In addition, there can be more than one probe for a given computer, each with the same or differing numbers of sensors.
Page 4 Because sensor measurements are taken more than once, each of sensors 305, 310, and 315 includes a corresponding timer 330, 335, and 340. The timers ensure that the sensors take measurements according to regular schedules. Each timer can be set to measure a metric using different intervals. But a person skilled in the art will recognize that, for sensors measuring metrics according to consistent schedules, a single timer can be used for more than one sensor.
Additionally, sensors can trigger on two different mechamsms. They can be triggered on a timer or they can be triggered by an irripromptu event. The latter is utilized to signal immediate attention to a critical event that has just taken place.
Finally, probe 125 includes message generator 345. Message generator 345 takes the measurements from the various sensors 305, 310, and 315, and assembles a message from the measurements. The message is then sent to the central server (not shown in FIG. 3).
Message generator 345 can generate a single message for several metric measurements, or message generator 343 can generate a separate message for each metric measurement.
FIG. 4 show the probes of FIG. I communicating with the monitoring apparatus of FIG. 1. In FIG. 4, message generator 345 is shown generating message 405. Message 405 is shown in greater detail in blow-up 410. The message is dated August 7, 2003, and is from site I (which includes computer 110). Blow-up 410 shows two metric measurements. The site has measured 500,000 transactions, and has five open days. There can also be other metrics included in the message.
Once message 405 is generated, it is delivered to e-mail server 415. Email server is responsible for starting message 405 along its journey to receiver 205 in the central server.
Although shown as a componen of computer 110, a person skilled in the art will recognize that e-mail server 415 can be part of a separate computer, distinct from computer 110, or can be a dedicated e-mail server. A typical implementation would most likely utilize the customer's existing e-mail implementation. This will provide a number of benefits including a cost savings through the elimination of a second server along with cost avoidance of supporting and maintaining the additional hardware.
FIG 5 shows a tlowchart of the procedure for using the probes of FIG. 1. At step 505, the probe accesses a value for a metric. The value can be accessed from a database or from software. As shown by arrow 510, step 505 can be repeated as often as necessary, to access values for multiple metncs. At step 515, a message is generated. At step 520, the message includes the value for the metric accessed in step 505. At step 525, the site is Page 5 included in the message, so that the central server knows from where the message originated.
At step 530, the message is delivered to the e-mail server, and at step 535, the message is sent to the monitoring apparatus by the c-mail server.
FIGs. OA-6C show a flowchart of the procedure for using the monitoring apparatus of FIG. 1. Tn FIG. 6A, at step 605, the monitoring apparatus receives a message from a probe.
At step 61.0, the metric is determined from the message. At step 615, a value for the metric is determined. At step 620, a site for the probe is determined.
At step 625 (FlU. 6B), the monitoring apparatus determines if the metric is site- specific. lithe metric is site specific, then at step 630 the monitoring apparatus determines an acceptable value or range of values for the metric/site combination. Otherwise, at step 635, the monitoring apparatus determines an acceptable value or range of values for the metric, without regard to the site of the probe. Either way, at step 640, the system compares the value from the message with the acceptable value/range.
At step 645 (FIG. 6C), the monitoring apparatus determines if the value for the metric is acceptable. If the value is acceptable, then at step 650 the monitoring apparatus logs the value for the metric and the site from which the value was received. Otherwise, at step 655, the monitoring apparatus displays an alert, letting someone know about a potential problem.
As shown in FIG. 6A, certain steps can be omitted or repeated. For example, since a single message can include values for multiple metrics, steps 610 and 615 can be repeated.
Also, if the metrics are not site-specific, step 620 can be omitted (although typically the Site is transmitted as part of the message, even if the metric is not site-specific). Finally, as shown on FIG. 6C, if the value for the metric is acceptable, the value does not need to be logged, although, again, typically the value is logged.
A person skilled in the art will recognize that an embodiment of the invention described above can be implemented using a computer. In that case, the method is embodied as instructions that make up a program. The program may be stored on computer-readable media, such as floppy disks, optical discs (such as compact discs), or fixed disks (such as hard drives), and can be resident in memory, such as random access memory (RAM), read- only memory (ROM), firmware, or flash RAIvI memory. The program as software can then be executed on a computer to implement the method. The program, or portions of its execution, can be distributed over multiple computers in a network.
Having illustrated and described the principles of the invention in a preferred embodiment thereof, it should be readily apparent to those skilled in the art that the invention Page 6 can be modified in arrangement and detail without departing from such principles. All modifications coming within the spirit arid scope of the accompanying claims are claimed.
Page 7

Claims (50)

1. A probe apparatus comprising: a first sensor to capture a first value for a first metric on a computer; and a message generator operative to send a first message to a central site, the message including the first value.
2. A probe apparatus according to claim 1, further comprising a second sensor to capture a second value for a second metric on the computer.
3. A probe apparatus according to claim 2, wherein the message generator is operative to send a second message to the central site, the second message including the second value.
4. A probe apparatus according to claim 2, wherein the message generator is operative to include the second value in the first message.
5. A probe apparatus according to claim 1, further comprising a timer, the first sensor operative to capture the first value for the first metTic when the timer ends and to reset the timer.
6. A probe apparatus according to claim 1, wherein: the computer includes a software package; and the probe monitors the software package.
7. A probe apparatus according to claim 1, wherein: the computer includes a database; and the probe monitors the database.
8. A monitoring apparatus, the system comprising: a message receiver to receive a first message from a first site, the first message including a first value for a first metric; a tester to determine if the first value is acceptable; and an alerter to alert someone if the first value is not acceptable.
Page 8
9. A monitoring apparatus according to claim 8, wherein: the tester includes a first filter, the first filter defming a range of acceptable values for the first metric; and the tester is operative to compare the first value with the range of acceptable values for the first filter.
10. A monitoring apparatus according to claim 9, wherein the tester includes: a plurality of filters, each filter determining a range of acceptable values for a metric; and a selector to select the first filter from the plurality of filters based on the first metric in the first message.
11. A monitoring apparatus according to claim 10, wherein: the plurality of filters includes at least one filter defining a range of acceptable values for the first metric associated with a site; and a selector to select the first filter from the plurality of filters based on a first site in the first message.
12. A monitoring apparatus according to claim 8, further comprising a log, the log includmg an entry corresponding to the first message.
13. A system for monitoring software, comprising: a central computer; a monitoring apparatus installed itt the central computer; a first computer; a ürst probe installed in the first computer; and a network coniiecting the central computer and the first computer.
14. A system according to claim 13, where: the system further comprises: a second computer; arid a second probe installed in the second computer; and Page 9 the network connects the central computer and the second computer.
15. A system according to claim 13, wherein: the first computer includes a software package; and S the first probe monitors the software package.
16. A system according to claim 13, wherein: the first computer includes a database; and the first probe monitors the database.
17. A system according to claim 13, wherein the monitoring apparatus includes: a message receiver to receive a first message from a first site, the first message including a first value for a first metric; a tester to determine if the first value is acceptable; and an alerter to alert someone if the first value is not acceptable; and the probe includes: a first sensor to capture a first value for a first metric; and a message generator operative to send a first message to a central site, the message including the first value.
18. A system according to claim 13, wherein the first computer includes an e-mail server to generate a message from the first probe to the nonitoring apparatus.
19. A method for using a probe, comprising: accessing a first value for a first metric by the probe; generating a message by the probe, the message including the first value for the first metric; and serding the message to a monitoring apparatus by the probe.
20. A method according to claim 19, wherein sending the message includes: delivenrig the message to an e-mail server by the probe; delivering the message to the moriitonng apparatus by the e-mail seiver.
Page 10
21. A method according to claim 19, wherein accessing the first value includes accessing a software package by the probe.
22. A method according to claim 19, wherein accessing the first value includes accessing a database by the probe.
23. A method according to claim 19, wherein generating a message further includes generating the message by the probe, the message including the first value for the first metric and an identifier for a site of the probe.
24. A method for using a monitoring apparatus, comprising: rcceiving a message; determining a first value for a first metric from the message; determining if the first value for the first metric is acceptable; and if the first value for the first metric is not acceptable displaying an alert that the first value for the first metric is not acceptable.
25. A method according to claim 24, further comprising, if the first value for the first metric is acceptable, logging the first value for the first metric.
26. A method according to claim 24, wherein: determining a first value includes determining the first value for the first metric for a first site from the message; and determining if the first value for the first metric is acceptable includes determining if the first value for the first metric for the first site is acceptable.
27. A method according to claim 24, wherein determining if the first value for the first metric is acceptable includes comparing the first value for the first metric with at least one acceptable value.
Page 11
28. A method according to claim 24, wherein determining if the first value for the first metric is acceptable includes cletermming if the first value for the first metric is within a range of acceptable values.
29. A method according to claim 24, wherein receiving a message includes: accessing the first value for the first metric by a probe; generating the message by the probe; and sending the message to the monitoring apparatus by the probe.
30. A method according to claim 29, wherein sending the message includes: delivering the message to an e-mail server by the probe; delivering the message to the monitoring apparatus by the e-mail server.
31. A method according to claim 29, wherein accessing the first value includes accessing a software package by the probe.
32. A method according to claim 29, wherein accessing the first value includes accessing a database by the probe.
33. A method according to claim 29, wherein generating a message further includes generating the message by the probe, the message including the first value for the first metric and an identifier for a site of the probe.
34. Computer-readable media containing a program to use a probe, the program comprising: software to access a first value for a first metric by the probe; software to generate a message by the probe, the message including the first value for the first metric; and software to send the message to a monitoring apparatus by the probe.
Computer-readable media according to clai.m 34, wherein the software to send the message includes: software to deliver the message to an e-mail server by the probe; Page 12 software to deliver the message to the monitoring apparatus by the e-mail server.
36. Computer-readable media according to claim 34, wherein the software to access the first value includes software to access a software package by the probe.
37. Computer-readable media according to claim 34, wherein the software to access the first value includes software to access a database by the probe.
38. Computer-readable media according to claim 34, wherein the software to 0 generate a message further includes software to generate the message by the probe, the message including the first value for the first metric and an identifier for a site of the probe.
39. Computer-readable media containing a program to use a monitoring apparatus, the program comprising: software to receive a message; sothvare to determine a first value for a first metric from the message; software to determine if the first value for the first metric is acceptable; and if the first value for the first metric is not acceptable, software to display an alert that the first value for the first metric is not acceptable.
40. Computer-readable media according to claim 39, further comprising, if the first value for the first metric is acceptaWe, software to log the first value for the first metric.
41. Computer-readable media according to claim 39, wherein: the software to determine a first value includes software to determine the first value for the first metric for a first site from the message; and the software to determine if the first value for the first metric is acceptable includes software to determine if the first value for the first metric for the first site is acceptable.
42. Computer-readable media according to claim 39. wherein the software to determine if the first value for the first metric is acceptable includes software to compare the first value for the first metric with at least one acceptable value.
Page 13
43. Coinputerreadable media accorditig to claim 39, wherein the software to determine if the first value for the first metric is acceptable includes software to determine if the first value for the first metric is wIthin a range of acceptable values.
44. Computer-readable media according to clami 39 wherein the software to receive a message includes: software to access the first value for the first metric by a probe; software to generate the message by the probe; and software to send the message to the monitoring apparatus by the probe.
45. . Computer-readable media according to claim 44, wherein the software to send the message includes: software to deliver the message to an email server by the probe; software to deliver the message to the monitoring apparatus by the e-mail server.
46. Computer-readable media according to claim 44, wherein the software to access the first value includes software to access a software package by the probe.
47. Computer-readable media according to claim 44, wherein the software to access the first value includes software to access a database by the probe.
48. Computer-readable media according to claim 44, wherein the software to generate a message further includes software to generate the message by the probe, the message including the first value for the first metric and an identifier for a site of the probe.
Page 14
49. A probe apparatus or a monitoring apparatus, or a system for monitoring software constructed and arranged to operate substantially as hereinbefore described with reference to and as illustrated in the accompanying drawings.
50. A method of using a monitoring apparatus substantially as hereinbefore described with reference to and as illustrated in the accompanying drawings.
Page 15
GB0420423A 2004-09-14 2004-09-14 Monitoring computer system software Withdrawn GB2424086A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0420423A GB2424086A (en) 2004-09-14 2004-09-14 Monitoring computer system software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0420423A GB2424086A (en) 2004-09-14 2004-09-14 Monitoring computer system software

Publications (2)

Publication Number Publication Date
GB0420423D0 GB0420423D0 (en) 2004-10-20
GB2424086A true GB2424086A (en) 2006-09-13

Family

ID=33306546

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0420423A Withdrawn GB2424086A (en) 2004-09-14 2004-09-14 Monitoring computer system software

Country Status (1)

Country Link
GB (1) GB2424086A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7712083B2 (en) 2003-08-20 2010-05-04 Igt Method and apparatus for monitoring and updating system software

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5726912A (en) * 1996-09-06 1998-03-10 Honeywell Iac Control system monitor
US5796633A (en) * 1996-07-12 1998-08-18 Electronic Data Systems Corporation Method and system for performance monitoring in computer networks
WO2000065448A1 (en) * 1999-04-28 2000-11-02 Universal Music Group A method and system for handling errors in a distributed computer system
US6636983B1 (en) * 1999-10-07 2003-10-21 Andrew E. Levi Method and system for uniform resource locator status tracking
WO2003090085A2 (en) * 2002-04-19 2003-10-30 Computer Associates Think, Inc. System and method for monitoring a computer application
WO2004088604A1 (en) * 2003-03-28 2004-10-14 Acres Gaming Incorporated Safeguards against cheating and malfunctioning of gaming devices that use forms of cashless wagering

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5796633A (en) * 1996-07-12 1998-08-18 Electronic Data Systems Corporation Method and system for performance monitoring in computer networks
US5726912A (en) * 1996-09-06 1998-03-10 Honeywell Iac Control system monitor
WO2000065448A1 (en) * 1999-04-28 2000-11-02 Universal Music Group A method and system for handling errors in a distributed computer system
US6636983B1 (en) * 1999-10-07 2003-10-21 Andrew E. Levi Method and system for uniform resource locator status tracking
WO2003090085A2 (en) * 2002-04-19 2003-10-30 Computer Associates Think, Inc. System and method for monitoring a computer application
WO2004088604A1 (en) * 2003-03-28 2004-10-14 Acres Gaming Incorporated Safeguards against cheating and malfunctioning of gaming devices that use forms of cashless wagering

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7712083B2 (en) 2003-08-20 2010-05-04 Igt Method and apparatus for monitoring and updating system software

Also Published As

Publication number Publication date
GB0420423D0 (en) 2004-10-20

Similar Documents

Publication Publication Date Title
US7712083B2 (en) Method and apparatus for monitoring and updating system software
US6886114B2 (en) Multiple device error management
CN110221905B (en) Timed task monitoring method, device, system, equipment and storage medium
JP6842299B2 (en) Diagnostic equipment, diagnostic methods and programs
US8086720B2 (en) Performance reporting in a network environment
US7779309B2 (en) Correlating complex errors with generalized end-user tasks
US20100030888A1 (en) Apparatus, and associated method, for monitoring system events
US8428909B2 (en) Use of statistics to determine calibration of instruments
US20090094336A1 (en) Method and Apparatus for Automated Monitoring of System Status
US20190310906A1 (en) Systems and methods for real time computer fault evaluation
CA3141565A1 (en) Method and system for automatically monitoring business systems
CN111857555A (en) Method, apparatus and program product for avoiding failure events of disk arrays
US20090089333A1 (en) Method and system for analyzing operating condition
CN110673973B (en) Abnormality determination method and device for application programming interface API
US20090240467A1 (en) Sensor fault detection systems and methods thereof
GB2424086A (en) Monitoring computer system software
CN102932194A (en) Bayes method-based Internet application service monitoring system and method
CN108197717B (en) Equipment maintenance system and method signal-based
AU2004210618A1 (en) Method and Apparatus for Monitoring and Updating System Software
CN112416731B (en) Stability monitoring method and device applied to block chain system
US11709091B2 (en) Remote monitoring of vehicle scale for failure prediction
US20150149827A1 (en) Identifying a change to indicate a degradation within a computing device
US20030056145A1 (en) Device for ensuring specifically optimized error handling in complex systems
CN112181780A (en) Detection and alarm method, device and equipment for containerized platform core component
JP2002182721A (en) Quality reliability information providing system for optical semiconductor device using communication network

Legal Events

Date Code Title Description
COOA Change in applicant's name or ownership of the application

Owner name: IGT

Free format text: FORMER APPLICANT(S): ACRES GAMING INCORPORATED

720A Reinstatement of application (patents act 1977, section 20(2)a)

Free format text: REQUEST FOR REINSTATEMENT FILED

AT Applications terminated before publication under section 16(1)
720A Reinstatement of application (patents act 1977, section 20(2)a)

Free format text: REQUEST FOR REINSTATEMENT ALLOWED

WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)