Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
Automatic Correlation Of Dynamic System Events Within Computing Devices
Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
Automatic Correlation Of Dynamic System Events Within Computing Devices
Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
Automatic Correlation Of Dynamic System Events Within Computing Devices
- San Jose CA, US Christopher Blayne Dreier - Austin TX, US
International Classification:
G06F 11/07 G06F 17/30
Abstract:
Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
Dynamic Second Factor Authentication For Cookie-Based Authentication
- San Jose CA, US Christopher Blayne Dreier - Austin TX, US David Aaron Wyde - Austin TX, US Kellen Mac Arb - Austin TX, US David McGrew - Poolesville MD, US Scott Fluhrer - North Attleboro MA, US
International Classification:
H04L 29/06 H04L 9/32 H04L 9/08
Abstract:
A server sends information to a client that allows the client to establish a first key at the client. The server then receives a session ID that has been encrypted using the first key. The first key is then established at the server, which can then decrypt the session ID using the first key. After the server validates the session ID, it determines a second key that is different from the first key. The server then receives the session ID encrypted with the second key, and decrypts the session ID encrypted with the second key.
Automatic Correlation Of Dynamic System Events Within Computing Devices
- San Jose CA, US Christopher Blayne Dreier - Austin TX, US
International Classification:
G06F 17/30
Abstract:
Systems and methods are described herein for logging system events within an electronic machine using an event log structured as a collection of tree-like cause and effect graphs. An event to be logged may be received. A new event node may be created within the event log for the received event. One or more existing event nodes within the event log may be identified as having possibly caused the received event. One or more causal links may be created within the event log between the new event node and the one or more identified existing event nodes. The new event node may be stored as an unattached root node in response to not identifying an existing event node that may have caused the received event.
Method And System For Delegating Administrative Control Across Domains
- San Jose CA, US Jay Kemper Johnston - Raleigh NC, US Christopher Blayne Dreier - Austin TX, US
International Classification:
H04L 12/26 H04L 29/06 H04L 29/08
US Classification:
726 23, 709224
Abstract:
In one embodiment, a method for delegating partial administrative controls across one or more administrative domains is provided. An upstream network device may advertise capabilities for controlling certain administrative functions to a downstream network device. The downstream network device may chose to act on one or more capabilities, allowing for partial administrative control across the administrative domain.
- San Jose CA, US Christopher Blayne Dreier - Austin TX, US
Assignee:
CISCO TECHNOLOGY, INC. - San Jose CA
International Classification:
H04R 1/08
US Classification:
381190
Abstract:
In one implementation, the output of a microphone is modified based on movement. A circuit or other controller is in communication with a microphone that generates an electrical signal based on sounds waves and a motion sensor. The motion sensor may be coupled to the microphone, coupled to a device including the microphone, or coupled to an object in the vicinity of the microphone. The controller is configured to receive the electrical signal from the microphone and motion data from the motion sensor. The controller is configured to perform a comparison of the motion data to a threshold level and adjust the electrical signal in response to the comparison of the motion data to a threshold acceleration level.