wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Self managing devices

profile
Nikita Gupta
Jun 21, 2022
0 Likes
0 Discussions
43 Reads

Self-management is the process by which computer  systems shall manage their own operation without human intervention. Self-management technologies are expected to pervade the next generation of network opretion systems.The growing complexity of modern networked computer systems is currently the biggest limiting factor in their expansion. The increasing heterogeneity of big corporate computer systems, the inclusion of mobile computing devices, and the combination of different networking technologies like WLAN, cellular phone networks, and mobile ad hoc networks make the conventional, manual management very difficult, time-consuming, and error-prone. More recently, self-management has been suggested as a solution to increasing complexity in cloud computingCurrently, the most important industrial initiative towards realizing self-management is the Autonomic Computing Initiative (ACI) started by IBM in 2001. The ACI defines the following four functional areas

Long-term conditions and their concomitant management place considerable pressure on patients, communities, and health care systems worldwide. International clinical guidelines on the majority of long-term conditions recommend the inclusion of self-management programs in routine management. Self-management programs have been associated with improved health outcomes; however, the successful and sustainable transfer of research programs into clinical practice has been inconsistent. Recent developments in mobile technology, such as mobile phone and tablet computer apps, could help in developing a platform for the delivery of self-management interventions that are adaptable, of low cost, and easily accessible.

 


Comments ()


Sign in

Read Next

Cyber Crime Investigation In The Era Of Big Data

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

Types of Hackers.

Blog banner

Street foods

Blog banner

Love is in air.....

Blog banner

Service Strategy In ITSM

Blog banner

Deadlock in operating system

Blog banner

VIRTUAL MACHINES

Blog banner

Payment Card Industry - Data Security Standard PCI-DSS compliance for online banking applications

Blog banner

RAID - LEVELS OF RAID

Blog banner

Process in OS

Blog banner

AOL Mail

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

Information Technology In E- Commerce

Blog banner

Malware

Blog banner

Animal’s have my heart

Blog banner

Bulk E-mail software

Blog banner

Disk Scheduling

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Big Data Architecture

Blog banner

Kernel in Operating System

Blog banner

Blog on Smartsheet.

Blog banner

Education: Key to your Prosperity

Blog banner

Making Money through Instagram

Blog banner

Modern Operating System - Khush bagaria

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

Hacking Mobile Platforms

Blog banner

The Role of cryptography in cyber security

Blog banner

LISP - Library Management System

Blog banner

Deadlock and Starvation

Blog banner

Whatsapp Messenger

Blog banner

What is Anxiety? How to manage Anxiety?

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Evolution of Operating Systems

Blog banner

Way to make your meal healthier.

Blog banner

Process states

Blog banner

Developments in Modern Operating Systems

Blog banner

Memory Management

Blog banner

Beauty of indian railway

Blog banner

NETWORK SECURITY RISKS

Blog banner

Dr. Venkadavarahan

Blog banner