The embodiments described herein relate generally to configuration management databases (CMDBs) and, more particularly, to scoring and/or prioritizing enterprise alerts in an intelligent fashion.
Cloud computing relates to the sharing of computing resources that are generally accessed via the Internet. In particular, a cloud computing infrastructure allows users, such as individuals and/or enterprises, to access a shared pool of computing resources, such as servers, storage devices, networks, applications, and/or other computing based services. By doing so, users are able to access computing resources on demand that are located at remote locations, which resources may be used to perform a variety computing functions, e.g., storing and/or processing large quantities of computing data. For enterprise and other organization users, cloud computing provides flexibility in accessing cloud computing resources without accruing large up-front costs, such as purchasing expensive network equipment or investing large amounts of time in establishing a private network infrastructure. Instead, by utilizing cloud computing resources, users are able redirect their resources to focus on their enterprise's core functions.
In today's communication networks, examples of cloud computing services a user may utilize include so-called software as a service (SaaS) and platform as a service (PaaS) technologies. SaaS is a delivery model that provides software as a service rather than an end product. Instead of utilizing a local network or individual software installations, software is typically licensed on a subscription basis, hosted on a remote machine, and accessed by client customers as needed. For example, users are generally able to access a variety of enterprise and/or information technology (IT)-related software via a web browser. PaaS acts an extension of SaaS that goes beyond providing software services by offering customizability and expandability features to meet a user's needs. For example, PaaS can provide a cloud-based developmental platform for users to develop, modify, and/or customize applications and/or automating enterprise operations without maintaining network infrastructure and/or allocating computing resources normally associated with these functions.
Within the context of cloud computing solutions for CMDBs, users may be asked to deal with ever increasing amounts of data, e.g., with respect to the number of Configuration Items (CIs) stored in the CMDB (including such CIs' relevant metadata, such as manufacturer, vendor, location, etc.), as well as the alerts, service metrics, and maintenance status information related to such CIs. In fact, the amount of data collected and stored in today's cloud computing solutions, such as CMDBs, may be orders of magnitude greater than what was historically collected and stored. Users tasked with automating and/or troubleshooting business, IT, and/or other organization-related functions (e.g., incident tracking and/or help desk-related functions) may be required to navigate ever increasing amounts of data to properly and efficiently perform their job functions. As a result, it can be difficult for users of such CMDBs to appreciate or understand how the various alerts raised within an enterprise system compare to each other, e.g., with respect to severity, business criticality, number of affected system components, etc. Thus, triaging times, debugging times, root cause analysis, and general alert prioritization and management continue to be potential areas of improvement for software developers and application vendors. The following embodiments address improvements to the presentation and prioritization of enterprise alerts to address at least these and other issues relating to the recommendation of corrective actions and/or probable causes of alerts, in order to provide an enhanced user experience.
The following presents a simplified summary of the disclosed subject matter in order to provide a basic understanding of some aspects of the subject matter disclosed herein. This summary is not an exhaustive overview of the technology disclosed herein. It is not intended to identify key or critical elements of the invention or to delineate the scope of the invention. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
In one embodiment, a system that provides the ability to display and/or traverse the various enterprise alerts comprises, a first trigger queue for storing alert triggers, a second trigger queue for storing changes in the topology or status of CIs stored in the CMDB, a smart priority score calculation module, a non-transitory memory, and one or more hardware processors configured to read instructions from the non-transitory memory. When executed, the instructions can cause the one or more hardware processors to store one or more alert items in the aforementioned first trigger queue and store one or more topology change items or service status change items in the aforementioned second trigger queue.
A processing job may be run (e.g., at a predetermined interval or in response to updates to the various trigger queues) to identify each alert item in the first trigger queue needing further processing, e.g., to update the priority score of the respective alert. To calculate the priority store for a respective alert, the system may first obtain a score value, e.g., from a category mapping table, in each of one or more categories. The value of each score may be configured to relate to a characteristic or degree of the corresponding category in the respective alert item. For example, an alert severity value of ‘critical’ may map to a score value of ‘4’, whereas an alert severity value of ‘minor’ may map to a score value of ‘2,’ depending on what is specified in a category mapping table for the ‘alert severity’ category. Next, the system may obtain a weight value, e.g., from a category order table, corresponding to each of the one or more categories, wherein each weight value relates to an importance or criticality of the corresponding category. For example, the alert severity category may have a weight value of 100,000, whereas another category of alert characteristic may have a weight value of 10.
Finally, the system may calculate, e.g., with a priority score calculation module, a so-called ‘smart priority’ score for the respective alert item, e.g., by adding together the products of each of the one or more score values for the respective alert item and its corresponding weight value. In some embodiments, the ‘smart priority’ score may be further enhanced via the application of supervised or semi-supervised machine learning techniques to historical user activity data for the CMDB. Based on the needs of a given implementation, the priority scores of open alerts pending in the system may be recalculated at predetermined intervals or in response to the storage of a trigger object indicating a change in system conditions that affects (or potentially affects) the priority level of a given alert.
In some embodiments, the system also provides an improved user interface for displaying the one or more alert items, e.g., wherein the one or more alert items are sorted in a ranked list based, at least in part, on their respective priority scores. In some embodiments, the user interface may also group the various alert items into ‘buckets,’ e.g., based on the criticality of the alerts in each respective group, such as “High,” “Medium,” and “Low.” The user interface may also present the user with a wide array of other relevant information regarding the one or more alert items, such as: the source of an alert; the name or type of CI affected by an alert; the node or IP address where an alert was raised; the identity of a user assigned to an alert; the location of an alert; the name, number, and/or owner of business services impacted by the alert; historical metrics related to the alert; as well as various potential options for resolving, reporting, or notifying others about a given alert.
According to still other embodiments, the user interface may provide further insights to a user regarding a given alert, e.g.: how often a given alert (or type of alert) has been repeated for the current CI (or related CIs); the incident history for the current CI (or related CIs); the changes history for the current CI (or related CIs); and/or the logged bug history for the current CI (or related CIs). These insights may also include suggestions of how to resolve the alert and/or links to articles explaining the alert and possible corrective actions that may be taken (or that have been successfully taken in the past).
In other embodiments, methods to perform the various enterprise alert prioritizing and presentation techniques summarized above are disclosed. In still other embodiments, non-transitory program storage devices are disclosed, which are readable by programmable control devices and which store instructions configured to cause one or more programmable control devices to perform the various alert presentation and prioritization techniques summarized above.
For a more complete understanding of this disclosure, reference is now made to the following brief description, taken in connection with the accompanying drawings and detailed description, wherein like reference numerals represent like parts.
In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments disclosed herein. It will be apparent, however, to one skilled in the art that the disclosed embodiments may be practiced without these specific details. In other instances, structure and devices are shown in block diagram form in order to avoid obscuring the disclosed embodiments. References to numbers without subscripts or suffixes are understood to reference all instance of subscripts and suffixes corresponding to the referenced number. Moreover, the language used in this disclosure has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter, resort to the claims being necessary to determine such inventive subject matter. Reference in the specification to “one embodiment” or to “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiments is included in at least one embodiment.
The terms “a,” “an,” and “the” are not intended to refer to a singular entity, unless explicitly so defined, but, rather, are intended to include the general class of which a specific example may be used for illustration. The use of the terms “a” or “an” may therefore mean any number that is at least one, including “one,” “one or more,” “at least one,” and “one or more than one.” The term “or” means any of the alternatives and any combination of the alternatives, including all of the alternatives, unless the alternatives are explicitly indicated as mutually exclusive. The phrase “at least one of” when combined with a list of items, means a single item from the list or any combination of items in the list. The phrase does not require all of the listed items unless explicitly so defined.
As used herein, the term “computing system” refers to a single electronic computing device that includes, but is not limited to a single computer, virtual machine, virtual container, host, server, laptop, and/or mobile device, or to a plurality of electronic computing devices working together to perform the function described as being performed on or by the computing system.
As used herein, the term “medium” refers to one or more non-transitory physical media that together store the contents described as being stored thereon. Embodiments may include non-volatile secondary storage, read-only memory (ROM), and/or random-access memory (RAM).
As used herein, the term “application” refers to one or more computing modules, programs, processes, workloads, threads and/or a set of computing instructions executed by a computing system. Example embodiments of an application include software modules, software objects, software instances and/or other types of executable code.
As used herein, the term “configuration item” or “CI” refers to a record for any component (e.g., computer, device, piece of software, database table, script, webpage, piece of metadata, etc.) in an enterprise network, for which all relevant data, such as manufacturer, vendor, location, etc. is stored in a CMDB.
Various embodiments are disclosed herein that provide users of a cloud computing system with the ability to display, prioritize, and/or handle enterprise alerts, e.g., in the form of a sorted list. In some embodiments, these alerts may be ranked according to a ‘smart priority’ calculation. The ‘smart priority’ calculation may take into account a number of factors related to given alert, e.g.: severity level, business criticality level, role, number of affected system components, types of affected system components, etc. These factors may be combined in the ‘smart priority’ calculation in a hierarchical fashion, e.g., based on a predetermined (or user-customized ranking) of the importance and/or weighting of the various factors. By seeing the historical and status metadata information relating to the alerts, users may more quickly understand which alerts to address first—and what possible solutions may be employed in order to close out the open alerts in the system.
Turning now to
In
To utilize computing resources within the developmental platform network 110, network operators may choose to configure the data centers 112 using a variety of computing infrastructures. In one embodiment, one or more of the data centers 112 are configured using a multi-tenant cloud architecture, such that a single server instance 114, which can also be referred to as an application instance, handles requests and serves multiple customers. In other words, data centers with multi-tenant cloud architecture commingle and store data from multiple customers, where multiple customer instances are assigned to a single server instance 114. In a multi-tenant cloud architecture, the single server instance 114 distinguishes between and segregates data and other information of the various customers. For example, a multi-tenant cloud architecture could assign a particular identifier for each customer in order to identify and segregate the data from each customer. Generally, implementing a multi-tenant cloud architecture may suffer from various drawbacks, such as a failure to single server instance 114 causing outages for all customers allocated to the single server instance 114.
In another embodiment, one or more of the data centers 112 are configured using a multi-instance cloud architecture to provide every customer its own unique customer instance. For example, a multi-instance cloud architecture could provide each customer instance with its own dedicated application server and dedicated database server. In other examples, the multi-instance cloud architecture could deploy a single server instance 114 and/or other combinations of server instances 114, such as one or more dedicated web server instances, one or more dedicated application server instances, and one or more database server instances, for each customer instance. In a multi-instance cloud architecture, multiple customer instances could be installed on a single physical hardware server, where each customer instance is allocated certain portions of the physical server resources, such as computing memory, storage, and processing power. By doing so, each customer instance has its own unique software stack that provides the benefit of data isolation, relatively less downtime for customers to access the developmental platform network 110, and customer-driven upgrade schedules. An example of implementing a customer instance within a multi-instance cloud architecture will be discussed in more detail below with reference to
In one embodiment, a customer instance may include one or more additional database tables for storing information describing one or more enterprise alerts and the various categories, values, and relative priorities of such alerts. The CMDB system may also include one or more database listeners that can listen for changes (e.g., additions, deletions, updates, etc.) to various tables on client instances and update one or more additional database tables, also referred to herein as “trigger queues,” based on any relevant changes that have taken place with respect to the various CIs in a system that may necessitate a recalculation of the priority score of one or more enterprise alerts stored in the system. After characterizing, scoring, and prioritizing the alerts open in the system, a list-like structure (e.g., a sorted list consisting of one or more alerts and their relevant metadata) may be generated to allow a user to visualize the importance, historical record, and other relevant information for each such alert—including potential troubleshooting or notification options.
To facilitate higher availability of the client instance 208, the application server instances 210a-210d and database server instances 212a and 212b are allocated to two different data centers 206a and 206b, where one of the data centers 206 acts as a backup data center. In reference to
As shown in
Although
Client device 315 may be configured to communicate through network 310 with client instance 305 that may be hosted on a remote server or a remote server instance in a cloud infrastructure, as described above. In this example, client device 315 may be configured to execute a web browser interface and receive a user indication of a search request 316 to be transmitted to client instance 305 and search engine 320 within that client instance 305 for processing. Search engine 320 may receive search request 316 and obtain informational settings 325 from within client instance 305 pertaining to the processing of search request 316. Alternatively, settings may be embedded within search request 316 without the need to reference settings 325.
Once search engine 320 has obtained a sufficient amount of information pertaining to search request 316, the search process may be initiated to and from the various relevant tables storing alerts and alert metadata information (326), identifying the appropriate alert set results (330, 340) based on the respective search queries, as shown by interface lines 331, 341. As will be discussed in further detail with reference to
Each search request 316 may return a group of one or more alerts matching the search criteria from the aforementioned various relevant tables storing alert and related alert metadata information. For example, a first search request may return a group of alert objects, “Alert Set 1” (AS1) 330, as shown by interface line 332, which will contain all the relevant alert items and related metadata necessary for the client instance 305 to generate a sorted list (or other desired data structure) allowing the user to view and/or traverse the results of the search request, as will be described in greater detail with reference to
Block diagram 300 illustrates an example of a portion of a service provider cloud infrastructure (e.g., network 110 of
Referring now to
A category mapping table (410) may also be employed, which may have at least the following fields: category, choice, and value (after mapping). As described above, the category field may correspond to the various categories as defined in category order table (405). For example, as shown in
A trigger alert table (415) may also be employed, which may have at least the following fields: alert reference and state. The trigger alert table, which will be discussed in further detail below with reference to
Finally, a CI Priority table (420) may also be employed, which may have at least the following fields: order and CI class name. The CI Priority table (420) may be used to support one or more various alert categories, such as the “CI class” category described above. As with the category order table (405), the order field may relate to the relevant importance of each of the various CI types with respect to calculating the priority level of a given alert associated with such CIs. For example, an alert relating to a ‘script include’ CI may be given a lower order (and thus higher priority) than an alert associated only with a User Interface (UI) page type of CI. As with the other tables mentioned with respect to
Referring now to
According to some embodiments, the calculation behind the smart priority score for a given alert may be stored in a metadata field along with the rest of the alert record, e.g., in the form of a JavaScript Object Notation (JSON) representation. It should be noted that it is not necessary to reveal the actual calculated smart priority value to the user of the system, although that is possible, if so desired. Rather, the smart priority value may simply be used to sort or rank the alert records returned to a user's console. As mentioned above, in some embodiments, the smart priority score may simply be used to group the various alert items into ‘buckets’ displayed on the user interface, e.g., based on the relative criticality of the alerts in each respective group, such as “High,” “Medium,” and “Low.” In this way, a user may prioritize his or her time to review or trouble shoot the “High” priority alert items first.
Referring now to
For each obtained alert record needing a priority recalculation, an alert smart priority calculation module (514) may be used to recalculate the smart priority score for each such alert, e.g., according to a smart priority calculation method, such as those described above with reference to
The alert prioritization schemes described herein may also necessitate one or more changes to existing table schema, such as the inclusion of additional fields in an alert table (518). For example, the alert table (518) may be modified to include a new column for the aforementioned smart priority score value that is calculated for each alert. The alert table (518) may also be modified to include a ‘manual priority’ column (e.g., in the form of a Boolean value) to allow for system to track whether the user has overridden the calculated smart priority value for a given alert and instead entered a manual priority for the alert (and/or ‘dragged’ the alert into a different category via the user interface). In some embodiments, the value of the smart priority calculated by the system prior to the user's manual modification may also be tracked by the alert table (518), e.g., in the event that the user wishes to return the alert to its priority value from prior to the manual manipulation by the user. Finally, as described above, the alert table (518) may also store a column for the string representation of the priority calculation itself, e.g., in the form of a structured JSON object, so that subsequent changes to the values of one or more of an alert's category values may be processed more readily and/or so that not all categories going into the smart priority score have to be recalculated any time that a single category value for the alert changes.
Referring now to
Exemplary user interface page 600 is shown as divided into three columns. In the left column of user interface page 600 is an alert panel 602. Alert panel 602 may be used to provide a quick overview (606) of a subset of the alerts stored in the system. For example, alert panel 602 may show only those alerts that were returned from the last alert query executed by the user, e.g., via search box functionality 604. The alert panel 602 may also be filtered by various alert properties, e.g., CI type, alert severity, source, services impacted, etc. Alternately, alert panel 602 may show the most recent ‘n’ alerts, the most critical ‘n’ alerts, the most repeated ‘n’ alerts, etc. In some embodiments, the smart priority value may be converted into a simple criticality ranking (607), such a “High,” “Medium,” or “Low.” In this way, users may easily tell at a glance which alerts are the most critical for them to respond to, even without needing to know the precise smart priority calculation (or smart priority score value) that went into determining the criticality ranking of the alert. The alerts in alert panel 602 may also be filtered by other factors, such as: only active alerts, only resolved alerts, only alerts that are ‘in process’ of being resolved, etc.
In the central column of user interface page 600 is a detailed alert information pane 610. The detailed alert information pane 610 may support a tabbed interface (608), allowing the user to easily switch between viewing the detailed information of one or more open alert items. As shown in
Alert information pane 610 may also comprise additional tabs (612) for displaying further detailed information about the alert, insights about the alert (e.g., its causes, potential solutions), metrics about the alert, and/or alert activity over time. An alert information panel (614) may, e.g., provide the various categories (615) of information discussed above (or others), such as: the source of an alert; the type, name, or class of CI associated with the alert; the task associated with the alert; the individual assigned to the alert; the severity of the alert; the current state of the alert; and/or the location of the alert. According to some embodiments, the user may be able to modify or override the data in one or more of the fields shown in alert information panel (614), assuming they have sufficient authority. For example, a user may wish to assign a different individual to an incident, modify the state of an alert (e.g., if it has been resolved), etc.
Alert information pane 610 may also comprise a listing of the business services impacted by the currently-selected alert (616), for example, in tabular form. The display may also include the name, severity, priority, and owner/assignee of such impacted services, so that the user may determine whether or not it is necessary to contact the owner/assignee of such impacted services, e.g., to warn them of potential adverse effects to their services, as well as links to such impacted services, e.g., to view a service map and/or drill down to get more data related to a particular impacted service.
Alert information pane 610 may also comprise a metrics sub-pane (618), which may, e.g., display one or more metrics tracked by the system relevant to the currently-selected alert, including links thereto. This metric may comprise, e.g., a projected amount of disk space remaining on a particular node in the enterprise system. This information may also be converted into a graphical display for convenience and ease of use, e.g., a line graph (619) or bar chart, so that a user may track the value of a given metric over time and perhaps identify or discover new trends in such metric, anticipate when such metric may be likely to exceed an acceptable operational threshold, or prevent the metric from exceeding the acceptable operational threshold altogether.
Alert information pane 610 may also comprise various other detailed sub-panels, e.g., related to secondary alerts (620), events (622), or whatever other relevant information may be tracked for an alert in a given enterprise implementation. Finally, there may also be a detailed sub-panel dedicated to additional alert information (624), such as knowledge articles with information regarding the currently-selected alert, potential troubleshooting solutions, financial aspects of the currently-selected alert (if applicable), correlated alerts, and/or a place for a user to provide feedback regarding the currently-selected alert, etc. When a user is done examining the additional alert information on a given alert, he or she may simply click the button to close the alert or update the alert (609), with whatever changes or modifications the user may have made to the alert's metadata.
In the right column of user interface page 600 is an alert assistant pane 626. The alert assistant pane 626 may comprise links to one or more possible resolution methods (628), such as scripts or workflows that may be run by the system to attempt to diagnose or correct the system error condition that is generating the currently-selected alert. The resolution methods (628) may also include links to one or more applications that may provide further information or assistance to the user in handling the alert. In some embodiments, the system may provide one or more out-of-the-box′ workflows for common tasks, which workflows may be dynamically adjusted, e.g., based on machine learning over time—or even applied automatically by the system in an effort to ‘heal’ itself without requiring user intervention at all.
The alert assistant pane 626 may also comprise links to one or more alert notification methods (630), such as creating an incident report for the alert, sharing the alert with one or more other users of the system (e.g., via a chat or “war room”-type interface), indicating that a given CI needs maintenance to be performed on it, and/or acknowledging the alert.
In some embodiments, the alert assistant pane 626 may also comprise a sub-panel for displaying one or more “predictive” alerts (632). Predictive alerts may comprise alerts for which the triggering condition has not yet occurred but where, e.g., based on an analysis of historical activity and/or a prediction of likely future activity, the application of machine learning or other artificial intelligence techniques, and/or the analysis of metric trends over time, the system has determined with some level of confidence or probability that a given alert may soon be triggered. For example, if there are 10 gigabytes of disk space remaining on a given node, and the disk space has been decreasing at the rate of 1 gigabyte an hour, the system may be able to issue a predictive alert that there will be a disk space projected low alert at some point in the next 10 hours for the given node. The use of predictive alerts may, in fact, allow users of the system to identify, triage, report, assign and/or troubleshoot certain system conditions before they even raise to the level of being a system alert. In other embodiments, the contents of alert assistant pane 626 itself may be auto-adjusted or populated based on the use of machine learning techniques, e.g., based on the most successful methods of resolving or notifying a given type of alert in the past.
Referring now to
Exemplary user interface page 700 may further comprise a sub-pane for CI details (710), such as the CI's class, type, name, IP address, location, and/or the name of the environment in which the CI is connected. Exemplary user interface page 700 may further comprise one or more additional sub-panes related to: alert repetition (712); incident history (714); changes history (716); and/or logged bug history (718). According to some embodiments, each of these further sub-panes may be able to be further broken down into statistics relevant to the current CI, i.e., associated with the currently-selected alert or to all related CIs. Related CIs may comprise, e.g., parent CIs (e.g., within a Level-1 or Level-2 relationship of selected CI), child CIs (e.g., within a Level-1 or Level-2 relationship of selected CI), CIs of a similar type, CIs performing the same service, CIs at a similar location, or CIs in a similar environment, etc. This type of information may provide further insight to the user as to whether a current alert is unique to a particular CI or is endemic to all CIs of that type (and, thus, likely to be an alert that is soon to be triggered on one or more additional related CIs in the future). Additional information related to a specific selected sub-pane may be displayed in sub-pane 720, e.g., information on the number of times a given alert has been repeated for the current CI (or related CIs) over a given time period.
Referring now to
If, after the passage of some predetermined amount of time (or upon determination that new items have been added to either trigger queue (510), it is determined that additional alerts and/or CIs have been updated (i.e., ‘Y’ at Step 814), the method may return to Step 804 to begin the processing of the new triggers and the recalculation of the priority values of the relevant alert records. If, instead, however, it is determined that no new items have been added to either trigger queue (510), or that alert reprioritization calculations are no longer desired (i.e., ‘N’ at Step 814), the method may end. Of course, as long as the system is continuing to monitor and re-prioritize alerts, the method 800 will effectively need to be run continuously so that alert and/or CI triggers may be processed in real-time (or with no greater than a maximum permissible lag time).
Referring now to
The computing system 900 includes a processing element 902 that contains one or more hardware processors, where each hardware processor may have a single or multiple processor cores. In one embodiment, the processing element 902 may include at least one shared cache that stores data (e.g., computing instructions) that are utilized by one or more other components of processing element 902. For example, the shared cache may be locally cached data stored in a memory for faster access by components of the processing elements 902. In one or more embodiments, the shared cache may include one or more mid-level caches, such as level 2 (L2), level 3 (L3), level 4 (L4), or other levels of cache, a last level cache (LLC), or combinations thereof. Examples of processors include, but are not limited to a central processing unit (CPU) such as a microprocessor. Although not illustrated in
Persons of ordinary skill in the art are aware that software programs may be developed, encoded, and compiled in a variety computing languages for a variety software platforms and/or operating systems and subsequently loaded and executed by processing element 902. In one embodiment, the compiling process of the software program may transform program code written in a programming language to another computer language such that the processing element 902 is able to execute the programming code. For example, the compiling process of the software program may generate an executable program that provides encoded instructions (e.g., machine code instructions) for processor 902 to accomplish specific, non-generic, particular computing functions.
After the compiling process, the encoded instructions may then be loaded as computer executable instructions or process steps to processing element 902 from storage (e.g., memory 904) and/or embedded within the processing element 902 (e.g., cache). Processing element 902 can execute the stored instructions or process steps in order to perform instructions or process steps to transform the computing device into a non-generic, particular, specially programmed machine or apparatus. Stored data, e.g., data stored by a storage device, can be accessed by processing element 902 during the execution of computer executable instructions or process steps to instruct one or more components within the computing device 900.
A user interface 910 can include a display, positional input device (such as a mouse, touchpad, touchscreen, or the like), keyboard, or other forms of user input and output devices. The user interface 910 can be coupled to processor element 902. Other output devices that permit a user to program or otherwise use the computing device can be provided in addition to, or as an alternative to, network communication unit 908. When the output device is (or includes) a display, the display can be implemented in various ways, including by a liquid crystal display (LCD), a cathode-ray tube (CRT), or a light emitting diode (LED) display, such as an organic LED (OLED) display. Persons of ordinary skill in the art are aware that the computing device 900 may comprise other components well known in the art, such as sensors, powers sources, and/or analog-to-digital converters, not explicitly shown in
At least one embodiment is disclosed and variations, combinations, and/or modifications of the embodiment(s) and/or features of the embodiment(s) made by a person having ordinary skill in the art are within the scope of the disclosure. Alternative embodiments that result from combining, integrating, and/or omitting features of the embodiment(s) are also within the scope of the disclosure. Where numerical ranges or limitations are expressly stated, such express ranges or limitations may be understood to include iterative ranges or limitations of like magnitude falling within the expressly stated ranges or limitations (e.g., from about 1 to about 10 includes, 2, 3, 4, etc.; greater than 0.10 includes 0.11, 0.12, 0.13, etc.).
Use of the term “optionally” with respect to any element of a claim means that the element is required, or alternatively, the element is not required, both alternatives being within the scope of the claim. Use of broader terms such as comprises, includes, and having may be understood to provide support for narrower terms such as consisting of, consisting essentially of, and comprised substantially of. Accordingly, the scope of protection is not limited by the description set out above but is defined by the claims that follow, that scope including all equivalents of the subject matter of the claims. Each and every claim is incorporated as further disclosure into the specification and the claims are embodiment(s) of the present disclosure.
It is to be understood that the above description is intended to be illustrative, and not restrictive. For example, the above-described embodiments may be used in combination with each other. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. The scope of the invention therefore should be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled. It should be noted that the discussion of any reference is not an admission that it is prior art to the present invention, especially any reference that may have a publication date after the priority date of this application