wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Self managing devices

profile
Nikita Gupta
Jun 21, 2022
0 Likes
0 Discussions
43 Reads

Self-management is the process by which computer  systems shall manage their own operation without human intervention. Self-management technologies are expected to pervade the next generation of network opretion systems.The growing complexity of modern networked computer systems is currently the biggest limiting factor in their expansion. The increasing heterogeneity of big corporate computer systems, the inclusion of mobile computing devices, and the combination of different networking technologies like WLAN, cellular phone networks, and mobile ad hoc networks make the conventional, manual management very difficult, time-consuming, and error-prone. More recently, self-management has been suggested as a solution to increasing complexity in cloud computingCurrently, the most important industrial initiative towards realizing self-management is the Autonomic Computing Initiative (ACI) started by IBM in 2001. The ACI defines the following four functional areas

Long-term conditions and their concomitant management place considerable pressure on patients, communities, and health care systems worldwide. International clinical guidelines on the majority of long-term conditions recommend the inclusion of self-management programs in routine management. Self-management programs have been associated with improved health outcomes; however, the successful and sustainable transfer of research programs into clinical practice has been inconsistent. Recent developments in mobile technology, such as mobile phone and tablet computer apps, could help in developing a platform for the delivery of self-management interventions that are adaptable, of low cost, and easily accessible.

 


Comments ()


Sign in

Read Next

Mesh Topology

Blog banner

File Management

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Dekkers Algorithm

Blog banner

Deadlock and Starvation

Blog banner

Os Virtual Memory

Blog banner

Banaras

Blog banner

Cache Memory(142)

Blog banner

Some facts about Technology

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

RAID

Blog banner

Royal enfield

Blog banner

Open Source Project By Google

Blog banner

Gis in agriculture and farming

Blog banner

Note on Process, Process creation and Process termination

Blog banner

Principles of Service Operation

Blog banner

Threading

Blog banner

Raid and levels of raid.

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Cross site scripting Attack

Blog banner

File Systems in OS.

Blog banner

Deadlocks

Blog banner

Platonic Solids

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Operating system and overviews

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

INTERNET SECURITY

Blog banner

Python as a tool for data analysis

Blog banner

"Mahakali cave"

Blog banner

Uniprocessor scheduling

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Phishing

Blog banner

Concurrency management in operating systems

Blog banner

Policies for Service Transition

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

Introduction to Virtual Memory - 080

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Fashion design

Blog banner

Measuring IT Risk

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner