wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Self managing devices

profile
Nikita Gupta
Jun 21, 2022
0 Likes
0 Discussions
43 Reads

Self-management is the process by which computer  systems shall manage their own operation without human intervention. Self-management technologies are expected to pervade the next generation of network opretion systems.The growing complexity of modern networked computer systems is currently the biggest limiting factor in their expansion. The increasing heterogeneity of big corporate computer systems, the inclusion of mobile computing devices, and the combination of different networking technologies like WLAN, cellular phone networks, and mobile ad hoc networks make the conventional, manual management very difficult, time-consuming, and error-prone. More recently, self-management has been suggested as a solution to increasing complexity in cloud computingCurrently, the most important industrial initiative towards realizing self-management is the Autonomic Computing Initiative (ACI) started by IBM in 2001. The ACI defines the following four functional areas

Long-term conditions and their concomitant management place considerable pressure on patients, communities, and health care systems worldwide. International clinical guidelines on the majority of long-term conditions recommend the inclusion of self-management programs in routine management. Self-management programs have been associated with improved health outcomes; however, the successful and sustainable transfer of research programs into clinical practice has been inconsistent. Recent developments in mobile technology, such as mobile phone and tablet computer apps, could help in developing a platform for the delivery of self-management interventions that are adaptable, of low cost, and easily accessible.

 


Comments ()


Sign in

Read Next

Cache memory

Blog banner

Service Transition Process in ITSM

Blog banner

I/O Management and Disk Scheduling

Blog banner

security controls

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

HTML vs HTML5

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Data Structures

Blog banner

Virtual machine and virtualizing

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

Network Footprinting in Cybersecurity

Blog banner

Blockchain uses and use cases

Blog banner

Cherish the Craft — Essential Tips to Maintain Your Patola Collection

Blog banner

Memory Management Techniques

Blog banner

Data Warehouse Bus Matrix

Blog banner

Guidelines for a low sodium diet.

Blog banner

Android Flashlight Application

Blog banner

Advantage of freedom

Blog banner

Beatbox

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Cycling

Blog banner

Types of email

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

City of Mumbai (Bombay):

Blog banner

BUFFER OVERFLOW_142

Blog banner

THE LEGAL ISSUES OF COMPUTER FORENSICS IN INDIA

Blog banner

Blockchain

Blog banner

CRISP-DM Methodology

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Semaphores

Blog banner

A book review

Blog banner

Virtual Machine

Blog banner

Data Mapping

Blog banner

BITCOIN WALLET

Blog banner

Types of Hackers

Blog banner

What is service level Agreement?

Blog banner

To-Do List In LISP

Blog banner

Elements and Principles of Photography

Blog banner

Raid

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner