WO2023087956A1 - Procédé et appareil de protection d'alarme pour produit virtualisé, dispositif et support - Google Patents

Procédé et appareil de protection d'alarme pour produit virtualisé, dispositif et support Download PDF

Info

Publication number
WO2023087956A1
WO2023087956A1 PCT/CN2022/123190 CN2022123190W WO2023087956A1 WO 2023087956 A1 WO2023087956 A1 WO 2023087956A1 CN 2022123190 W CN2022123190 W CN 2022123190W WO 2023087956 A1 WO2023087956 A1 WO 2023087956A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
item
shielding
virtualization
configuration information
Prior art date
Application number
PCT/CN2022/123190
Other languages
English (en)
Chinese (zh)
Inventor
苏道恒
朱道昌
Original Assignee
苏州浪潮智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏州浪潮智能科技有限公司 filed Critical 苏州浪潮智能科技有限公司
Publication of WO2023087956A1 publication Critical patent/WO2023087956A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Definitions

  • the present application relates to the field of computer technology, and in particular to a method, device, device and medium for shielding alarms of virtualization products.
  • a mature server virtualization platform brings many benefits to the enterprise, and when there is a problem with our system or webpage, the biggest impact is on the interests of the enterprise. If the user experience is poor, they may no longer use the product, thus lead to loss of customers. At this time, the alarm system of the platform is particularly important. Timely and reasonable alarm prompts can enable users to quickly discover and locate problems, and can also notify the designated operation and maintenance personnel of the alarm, so as to quickly solve the problem.
  • server virtualization products have many resources, which will generate a lot of irrelevant alarm information. The alarm information is complicated, and these alarm information cannot be completely ignored. In this case, it is necessary to configure the shielding and display of alarm information.
  • this application provides a method, device, device and medium for virtualized product alarm shielding, which can flexibly configure the display and shielding of all alarms, so that the alarm information is clear and clear, and users can Customize the alarm information display or shield configuration of various resources according to requirements, which improves the user experience.
  • a method for shielding an alarm of a virtualization product includes:
  • Obtain the alarm shielding configuration information of the virtualization product select the alarm item to be shielded and at least one alarm object associated with the alarm item according to the configuration information; send the data of the alarm item and the alarm object to the background, so that the background can analyze the alarm according to the data Items and alarm objects are shielded.
  • the above method further includes: creating a visualization page, and the visualization page is used to display configuration information.
  • the above method also includes: the visualization page is also used to display the alarm list after the alarm item and the alarm object are shielded, so that the user can obtain the alarm situation after the alarm item and the alarm object are shielded according to the alarm list.
  • the above method further includes: creating one or more buttons on the visualization page, and the buttons are used to control the shielding and/or displaying of alarm items and alarm objects.
  • the above method further includes: obtaining user requirements, displaying the alarm shielding configuration of system resources according to user requirements and configuration information; selecting alarm items and associated alarms according to the configuration information
  • the at least one alarm object of the item also includes: selecting the alarm item and at least one alarm object associated with the alarm item according to the configuration of the alarm mask.
  • the alarm masking configuration situation may include at least one of the following: the name of the system resource, the type of the system resource, the alarm item masked by the system resource, the operation status of the alarm item masked by the system resource, and the configuration time of the alarm item masked by the system resource .
  • the above method also includes: storing the alarm information of the alarm item and the alarm object; in response to detecting that the alarm information associated with the system failure is masked, querying the associated alarm information in the background, and processing the system failure according to the associated alarm information .
  • an alarm shielding device for virtualized products including: an acquisition module configured to obtain alarm shielding configuration information of virtualized products; a configuration module configured to select alarm items to be shielded and associated alarm items according to the configuration information at least one alarm object; the control module is configured to send the data of the alarm item and the alarm object to the background, so that the background can shield the alarm item and the alarm object according to the data.
  • an electronic device including a memory, a processor, and a computer program stored on the memory and operable on the processor.
  • the processor executes the computer program, an alarm shielding method for a virtualization product is implemented.
  • a computer non-volatile readable storage medium which stores computer-executable instructions, and the computer-executable instructions are used to execute a method for shielding an alarm of a virtualization product.
  • the embodiments of the present application have the following beneficial effects:
  • the method, device, device and medium for virtualized product alarm shielding provided by the embodiments of the present application can obtain alarm shielding configuration information, select redundant alarm items and associated alarm objects to perform Shielding makes the alarm information clear; users can also customize the alarm information display or shielding configuration of various resources according to their needs, and flexibly configure the display and shielding of all alarms in the system to improve the user experience; it is also possible to edit the shielded alarm items and The alarm information of the alarm object is stored to avoid the problem of untimely processing of system failures caused by the shielding of alarm information.
  • Fig. 1 shows the overall flowchart of the virtualization product alarm shielding method provided by the embodiment of the present application
  • FIG. 2 shows a schematic structural diagram of a virtualization product alarm shielding device provided by an embodiment of the present application
  • FIG. 3 illustrates an exemplary system that may be used to implement various embodiments described in this application.
  • the present application provides a virtualization product alarm shielding method, referring to Figure 1, the method includes the following steps:
  • server virtualization products have many resources, which will generate a lot of irrelevant alarm information, which makes the alarm information more complicated.
  • alarm information applicable to various scenarios, including those that users pay attention to, those that users do not pay attention to, and important ones. , secondary, etc.
  • the configuration information includes information about the alarm item and the alarm object associated with the alarm item.
  • S2 select an alarm item to be shielded and at least one alarm object associated with the alarm item.
  • the alarm items are determined manually, and the user selects the alarm items to be shielded according to the configuration information.
  • the CPU usage of the virtual machine is used as an alarm item, and it is stipulated that if the CPU usage of the virtual machine exceeds 80%, the background pushes the alarm information to the front end, and the user receives the alarm information to process the alarm.
  • These alarm items can be classified according to the type of server resources. For example, the CPU usage of the virtual machine, the memory usage of the virtual machine, and the disk usage of the virtual machine can be divided into virtual machine resource alarms; the CPU usage of the host, the host Memory usage, host disk usage, etc. can be divided into host resource alarms.
  • the alarm item selects the CPU usage of a virtual machine.
  • This alarm item belongs to a virtual machine alarm, and the corresponding alarm object is a virtual machine in the system. At this time, obtain the system virtual machine list and select the virtual machine that you want to block the alarm. Similarly, the alarm item selects the CPU usage of the host.
  • This alarm item belongs to the host resource alarm, and the corresponding alarm object is the host. At this time, obtain the host list and select the host that you want to block the alarm.
  • the alarm object here may be a system resource object. It should be noted that there can only be one selected alarm item, and there can be one or more associated alarm objects (system resource objects).
  • the above method further includes:
  • S2 further includes: selecting an alarm item and at least one alarm object associated with the alarm item according to the configuration of the alarm mask.
  • the alarm shielding configuration of the system resource can be obtained in units of system resources, and can be displayed visually through lists or textual descriptions.
  • the system resources may include resources such as hosts, virtual machines, network cards, and storage of the virtualization system.
  • the alarm masking configuration may include the name of the virtual machine, the type of the virtual machine, the masked alarm item, and the operation status of the masked alarm item (the enabling or disabling status of the masked alarm item ), configuration time, and so on.
  • the configuration of alarm shielding may include one or more of the above, which may be displayed according to the actual needs of the user.
  • the background receives the data of these alarm items and alarm objects that need to be shielded, and intercepts the alarms of related alarm objects (system resource objects) based on these data information, and silently processes these alarms that have been set to be shielded to prevent these alarms
  • the alarm information is expressed to the front-end page, and then these alarms are shielded and processed.
  • the above method also includes:
  • the above method also includes:
  • the visualization page is also used to display the alarm list after the alarm items and alarm objects are masked, so that the user can obtain the alarm situation after the alarm items and alarm objects are masked according to the alarm list.
  • the above method also includes:
  • buttons are used to control the shielding and/or display of alarm items and alarm objects.
  • users can browse the displayed alarm list and alarm shielding configuration information on the visualization page, and learn about the configuration of alarms, system resource information, etc. on the visualization page; they can select alarm items and associated Alarm objects are displayed and/or masked.
  • Different alarm masking configuration combinations can be deployed through the buttons, and alarms can be masked/displayed according to different alarm masking configuration combinations by clicking the button.
  • the flexibility of the alarm masking configuration is high, and the user experience is good.
  • the above method also includes:
  • the masked alarm items and alarm information of alarm objects are also stored on the server side. If the system fails and it is detected that the alarm information recording these failures has been blocked, the user can also query the corresponding alarm records in the background, and process the transmitted failures according to the information in the alarm records.
  • redundant alarm items and associated alarm objects are selected for masking, so that the alarm information is clear; users can also customize the alarm information display or masking configuration of various resources according to requirements , and flexibly configure the display and shielding of all alarms in the system to improve user experience; it can also store the alarm information of the shielded alarm items and alarm objects, so as to avoid the problem of untimely processing of system failures caused by the shielding of alarm information.
  • the present application also provides a virtualization product alarm shielding device, referring to FIG. 2 , including: an acquisition module, a configuration module, and a control module.
  • the acquisition module is set to obtain the alarm shielding configuration information of the virtualization product
  • the configuration module is set to select the alarm item to be shielded and at least one alarm object of the associated alarm item according to the configuration information
  • the control module is set to set the alarm item
  • the data of the alarm object is sent to the background, so that the background can shield the alarm item and the alarm object according to the data.
  • the acquisition module is also configured to create a visualization page, wherein the visualization page is used to display configuration information.
  • the visualization page is also used to display the alarm list after the alarm items and alarm objects are masked, so that the user can obtain the alarm situation after the alarm items and alarm objects are masked according to the alarm list.
  • the configuration module is also configured to create one or more buttons on the visualization page, and the buttons are used to control the shielding and/or display of alarm items and alarm objects.
  • the acquisition module is also set to acquire user requirements, and display the alarm shielding configuration of system resources according to user requirements and configuration information;
  • the configuration module is also set to select an alarm item and at least one alarm of the associated alarm item according to the alarm mask configuration object.
  • the alarm shielding configuration conditions may include at least one of the following:
  • the name of the system resource The name of the system resource, the type of the system resource, the alarm item masked by the system resource, the running status of the alarm item masked by the system resource, and the configuration time of the alarm item masked by the system resource.
  • control module is also configured to store the alarm information of the alarm item and the alarm object; if it is detected that the alarm information associated with the system failure is shielded, the control module is also configured to query the associated alarm information in the background, and according to the associated alarm information Information processing system failure.
  • an entry button is also deployed in the acquisition module, and the configuration module can be entered through the entry button.
  • the user can select the alarm item to be shielded in the configuration module, and then associate the alarm object of the alarm item according to the selected alarm item (system resource object) to perform corresponding alarm shielding.
  • the selected alarm item system resource object
  • a virtualized product alarm shielding device which can flexibly configure the display and shielding functions of all alarms in the system, so that the alarm information is clear and clear, and can also store the alarm information of the masked alarm items and alarm objects to avoid The problem of system failure not being dealt with in time due to the shielding of alarm information occurs. It has strong practicability and high flexibility. It provides a visual interface for users to customize the alarm information display or shielding configuration of various resources according to their needs, and the user experience is good.
  • the present application also provides an electronic device, including a memory, a processor, and a computer program stored on the memory and operable on the processor.
  • the processor executes the program, the above-mentioned virtualization product alarm shielding method can be realized. .
  • a system can be used as the above-mentioned electronic device in any one of the above-mentioned embodiments for the method for shielding an alarm of a virtualized product.
  • a system may include one or more computer-readable media (e.g., system memory or NVM/storage devices) having instructions and coupled to the one or more computer-readable media and configured to execute the instructions to One or more processors that implement a module to perform the actions described in this application.
  • the system control module may include any suitable interface controller to provide any suitable interface.
  • the system control module may include a memory controller module to provide an interface to the system memory.
  • a memory controller module may be a hardware module, a software module and/or a firmware module.
  • System memory may be used, for example, to load and store data and/or instructions for the system.
  • system memory may include any suitable volatile memory, such as suitable DRAM.
  • the system memory may include Double Data Rate Type Quad Synchronous Dynamic Random Access Memory (DDR4 SDRAM).
  • DDR4 SDRAM Double Data Rate Type Quad Synchronous Dynamic Random Access Memory
  • system control module may include one or more input/output (I/O) controllers to provide interfaces to NVM/storage devices and communication interface(s).
  • I/O input/output
  • NVM/storage devices may be used to store data and/or instructions.
  • the NVM/storage device may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more hard disk drives (HDD ), one or more compact disc (CD) drives, and/or one or more digital versatile disc (DVD) drives).
  • suitable non-volatile memory e.g., flash memory
  • suitable non-volatile storage device(s) e.g., one or more hard disk drives (HDD ), one or more compact disc (CD) drives, and/or one or more digital versatile disc (DVD) drives.
  • HDD hard disk drives
  • CD compact disc
  • DVD digital versatile disc
  • NVM/storage devices may include storage resources that are physically part of the device on which the system is installed, or may be accessed by the device without necessarily being part of the device. For example, NVM/storage devices may be accessed over a network via communication interface(s).
  • the communication interface(s) may provide the system with an interface to communicate over one or more networks and/or with any other suitable device.
  • the system may communicate wirelessly with one or more components of the wireless network according to any of one or more wireless network standards and/or protocols.
  • At least one of the processor(s) may be packaged with logic of one or more controllers of the system control module (eg, a memory controller module).
  • at least one of the processor(s) may be packaged with the logic of the one or more controllers of the system control module to form a system-in-package (SiP).
  • SiP system-in-package
  • at least one of the processor(s) may be integrated on the same die as the logic of the one or more controllers of the system control module.
  • at least one of the processor(s) may be integrated on the same die with the logic of the one or more controllers of the system control module to form a system on chip (SoC).
  • SoC system on chip
  • a system may be, but is not limited to, a server, workstation, desktop computing device, or mobile computing device (eg, laptop computing device, handheld computing device, tablet computer, netbook, etc.).
  • the system may have more or fewer components and/or a different architecture.
  • a system includes one or more cameras, a keyboard, a liquid crystal display (LCD) screen (including a touchscreen display), a non-volatile memory port, multiple antennas, a graphics chip, an application-specific integrated circuit (ASIC) ) and speakers.
  • LCD liquid crystal display
  • ASIC application-specific integrated circuit
  • the present application can be implemented in software and/or a combination of software and hardware, for example, it can be implemented by using an application specific integrated circuit (ASIC), a general purpose computer or any other similar hardware devices.
  • ASIC application specific integrated circuit
  • the software program of the present application can be executed by a processor to realize the steps or functions described above.
  • the software program (including associated data structures) of the present application can be stored in a computer-readable recording medium such as RAM memory, magnetic or optical drive or floppy disk and the like.
  • some steps or functions of the present application may be implemented by hardware, for example, as a circuit that cooperates with a processor to execute each step or function.
  • a part of the present application can be applied as a computer program product, such as a computer program instruction.
  • a computer program product such as a computer program instruction.
  • the method and/or technical solution according to the present application can be invoked or provided through the operation of the computer.
  • computer program instructions exist in computer-readable media in forms including but not limited to source files, executable files, installation package files, etc. Limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding post-installation program program.
  • a computer readable medium may be any available computer non-volatile readable storage medium or communication medium that can be accessed by a computer.
  • Communication media includes the media whereby communication signals embodying, for example, computer readable instructions, data structures, program modules or other data are transmitted from one system to another.
  • Communication media can include guided transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (unguided transmission) media capable of propagating waves of energy, such as acoustic, electromagnetic, RF, microwave, and infrared .
  • Computer readable instructions, data structures, program modules or other data may be embodied, for example, as a modulated data signal in a wireless medium such as a carrier wave or similar mechanism such as embodied as part of spread spectrum technology.
  • modulated data signal means a signal that has one or more of its characteristics changed or set in such a manner as to encode information in the signal. Modulation can be analog, digital or mixed modulation techniques.
  • an embodiment according to the present application includes an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein when the computer program instructions are executed by the processor, triggering
  • the operation of the device is based on the foregoing methods and/or technical solutions according to multiple embodiments of the present application.
  • the present application also provides a non-volatile computer-readable storage medium storing computer-executable instructions, and the computer-executable instructions are used to execute the method for shielding an alarm of a virtualization product.
  • computer non-volatile readable storage media may include volatile and non-volatile media implemented in any method or technology for storing information such as computer readable instructions, data structures, program modules, or other data. volatile, removable and non-removable media.
  • computer non-volatile readable storage media include, but are not limited to, volatile memory, such as random access memory (RAM, DRAM, SRAM); and non-volatile memory, such as flash memory, various read-only memory (ROM) , PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other media now known or developed in the future capable of Store computer readable information/data for use by computer systems.
  • volatile memory such as random access memory (RAM, DRAM, SRAM
  • non-volatile memory such as flash memory, various read-only memory (ROM) , PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferro

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Human Computer Interaction (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • User Interface Of Digital Computer (AREA)
  • Debugging And Monitoring (AREA)

Abstract

L'invention concerne un procédé et un appareil de protection d'alarme pour un produit virtualisé, ainsi qu'un dispositif et un support. Le procédé consiste à : acquérir des informations de configuration de protection d'alarme d'un produit virtualisé (S1) ; en fonction des informations de configuration, sélectionner un élément d'alarme qui doit être protégé et au moins un objet d'alarme associé à l'élément d'alarme (S2) ; et émettre des données de l'élément d'alarme et de l'objet d'alarme vers un arrière-plan, de telle sorte que l'arrière-plan effectue un traitement de protection sur l'élément d'alarme et l'objet d'alarme en fonction des données (S3). L'affichage et la protection de toutes les alarmes peuvent être configurés de manière flexible, de telle sorte que des informations d'alarme soient claires et définies et un utilisateur peut personnaliser une configuration d'affichage ou de protection des informations d'alarme de diverses ressources en fonction des demandes, ce qui permet d'améliorer l'expérience de l'utilisateur.
PCT/CN2022/123190 2021-11-17 2022-09-30 Procédé et appareil de protection d'alarme pour produit virtualisé, dispositif et support WO2023087956A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111360030.X 2021-11-17
CN202111360030.XA CN114202354A (zh) 2021-11-17 2021-11-17 一种虚拟化产品告警屏蔽方法、装置、设备和介质

Publications (1)

Publication Number Publication Date
WO2023087956A1 true WO2023087956A1 (fr) 2023-05-25

Family

ID=80647757

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/123190 WO2023087956A1 (fr) 2021-11-17 2022-09-30 Procédé et appareil de protection d'alarme pour produit virtualisé, dispositif et support

Country Status (2)

Country Link
CN (1) CN114202354A (fr)
WO (1) WO2023087956A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114202354A (zh) * 2021-11-17 2022-03-18 苏州浪潮智能科技有限公司 一种虚拟化产品告警屏蔽方法、装置、设备和介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5636206A (en) * 1994-05-19 1997-06-03 Fujitsu Limited System for achieving alarm masking processing
CN101296466A (zh) * 2008-06-12 2008-10-29 广东高新兴通信股份有限公司 一种对基站产生告警的屏蔽方法
CN101741615A (zh) * 2009-12-14 2010-06-16 北京神州泰岳软件股份有限公司 基于服务器的告警过滤系统及方法
CN104683155A (zh) * 2015-03-09 2015-06-03 江苏物联网研究发展中心 网络管理系统中的告警屏蔽机制
CN107358300A (zh) * 2017-06-19 2017-11-17 北京至信普林科技有限公司 一种基于多平台自主预测的智能运维告警过滤方法及系统
CN114202354A (zh) * 2021-11-17 2022-03-18 苏州浪潮智能科技有限公司 一种虚拟化产品告警屏蔽方法、装置、设备和介质

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109039740B (zh) * 2018-08-01 2022-07-19 平安科技(深圳)有限公司 一种处理运维监控告警的方法及设备
CN111585785B (zh) * 2020-03-27 2023-07-21 中国平安人寿保险股份有限公司 告警信息的屏蔽方法、装置、计算机设备及存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5636206A (en) * 1994-05-19 1997-06-03 Fujitsu Limited System for achieving alarm masking processing
CN101296466A (zh) * 2008-06-12 2008-10-29 广东高新兴通信股份有限公司 一种对基站产生告警的屏蔽方法
CN101741615A (zh) * 2009-12-14 2010-06-16 北京神州泰岳软件股份有限公司 基于服务器的告警过滤系统及方法
CN104683155A (zh) * 2015-03-09 2015-06-03 江苏物联网研究发展中心 网络管理系统中的告警屏蔽机制
CN107358300A (zh) * 2017-06-19 2017-11-17 北京至信普林科技有限公司 一种基于多平台自主预测的智能运维告警过滤方法及系统
CN114202354A (zh) * 2021-11-17 2022-03-18 苏州浪潮智能科技有限公司 一种虚拟化产品告警屏蔽方法、装置、设备和介质

Also Published As

Publication number Publication date
CN114202354A (zh) 2022-03-18

Similar Documents

Publication Publication Date Title
US8683589B2 (en) Providing protection against unauthorized network access
US9124488B2 (en) Method and apparatus for visualizing the health of datacenter objects
WO2020063846A1 (fr) Procédé et dispositif de présentation d'informations de mise à jour de programme invité
US20110219331A1 (en) Window resize on remote desktops
US9547466B2 (en) Systems and methods for using screen sampling to detect display changes
US11099725B2 (en) User interface tools for visual exploration of multi-dimensional data
US20190012005A1 (en) Method and device for asynchronous touch and asynchronous display on dual-screen and computer readable storage medium
WO2020216165A1 (fr) Procédé et dispositif de chargement d'étiquette de page dans une application
CN110321189B (zh) 一种在宿主程序中呈现寄宿程序的方法与设备
WO2023087956A1 (fr) Procédé et appareil de protection d'alarme pour produit virtualisé, dispositif et support
CN113127050B (zh) 一种应用资源打包过程监控方法、装置、设备和介质
CN112148700A (zh) 日志数据处理方法、装置、计算机设备和存储介质
EP3314385A1 (fr) Interaction de connaissance de données multidimensionnelles
US20200089512A1 (en) Method and Apparatus for Invoking Input Method, Server, and Terminal
US20150067139A1 (en) Agentless monitoring of computer systems
TWI744216B (zh) 提供提示資訊的方法及裝置
CN109284101B (zh) 一种对象属性的关联变更方法和装置
US20150007191A1 (en) Methods, systems, and computer program products for selecting a resource based on a measure of a processing cost
US20130145054A1 (en) Supervising a data storage system
US8719704B2 (en) Seamless integration of additional functionality into enterprise software without customization or apparent alteration of same
JP6536680B2 (ja) 情報処理装置、情報処理方法、およびプログラム
US20150100615A1 (en) Drag and drop of a uri to link resources
CN110321205B (zh) 一种在宿主程序中管理寄宿程序的方法与设备
WO2018000395A1 (fr) Procédé et appareil de gestion de données
US8539171B2 (en) Analysis and timeline visualization of storage channels

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22894494

Country of ref document: EP

Kind code of ref document: A1