wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Self managing devices

profile
Nikita Gupta
Jun 21, 2022
0 Likes
0 Discussions
43 Reads

Self-management is the process by which computer  systems shall manage their own operation without human intervention. Self-management technologies are expected to pervade the next generation of network opretion systems.The growing complexity of modern networked computer systems is currently the biggest limiting factor in their expansion. The increasing heterogeneity of big corporate computer systems, the inclusion of mobile computing devices, and the combination of different networking technologies like WLAN, cellular phone networks, and mobile ad hoc networks make the conventional, manual management very difficult, time-consuming, and error-prone. More recently, self-management has been suggested as a solution to increasing complexity in cloud computingCurrently, the most important industrial initiative towards realizing self-management is the Autonomic Computing Initiative (ACI) started by IBM in 2001. The ACI defines the following four functional areas

Long-term conditions and their concomitant management place considerable pressure on patients, communities, and health care systems worldwide. International clinical guidelines on the majority of long-term conditions recommend the inclusion of self-management programs in routine management. Self-management programs have been associated with improved health outcomes; however, the successful and sustainable transfer of research programs into clinical practice has been inconsistent. Recent developments in mobile technology, such as mobile phone and tablet computer apps, could help in developing a platform for the delivery of self-management interventions that are adaptable, of low cost, and easily accessible.

 


Comments ()


Sign in

Read Next

Explain the concept of ( MIS) Management information systems

Blog banner

memory managment

Blog banner

15 Websites that will make your life easier ...!!!

Blog banner

10 Unsolved Mysteries all over the world

Blog banner

Python as a tool for data analysis

Blog banner

Cache Memory(142)

Blog banner

clock

Blog banner

Lucidchart

Blog banner

Direct Memory Access

Blog banner

Virtual Memory

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Evolution of Operating System

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

DURGA POOJA

Blog banner

RAID

Blog banner

Security Breaches in Stock market trading

Blog banner

Basic Security For SOAP Services

Blog banner

Deadlock and Starvation in an Operating System

Blog banner

Memory Management in Operating System

Blog banner

Memory Management

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Types of E-Commerce

Blog banner

Reconnaissance

Blog banner

The Laws of Karma

Blog banner

Scheduling in Operating Systems

Blog banner

I/O Buffering

Blog banner

Health and fitness

Blog banner

Digital Marketing

Blog banner

memory management

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

AutoML: The Future of Automated Data Science

Blog banner

Smartsheet

Blog banner

Explaining Buffer Overflow with Example

Blog banner

Bots and Cyber Security

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

GUIDE TO GIS

Blog banner

MEMORY HIERARCHY

Blog banner

Sessions In OS.

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Health is Wealth

Blog banner