Failure Prediction Tool

Coordinated by
UTC

The Failure Prediction Tool (FPT) performs failure predictions by monitoring the logs of the applications that make up a system. It has a REST interface through which it receives in real time the log messages from the monitored applications.

Description

Describe the innovation content of the result:
A tool for predicting system failures.
Who will be the customer?
Any business or organization that relies on complex systems, and wants to minimize downtime, reduce maintenance costs, and enhance operational efficiency.
What benefit will it bring to the customers?
FPT offers customers a proactive approach to managing their systems, leading to increased efficiency, cost savings, better customer experiences, and a competitive advantage in their respective markets.
When is the expected date of achievement in the project (Mth/yr)?
Month 30.
When is the time to market (Mth/yr)?
At the end of the project.
What are the costs to be incurred after the project and before exploitation?

Probably further developments and maintenance.
What is the approximate price range of this result/price of licences?
Unknown at the moment.
What are the market size in Millions € for this result and relevant trend?
N/A
How will this result rank against competing products in terms of price/performance?
To be determined
Who are the competitors for this result?
Sumo Logic, Splunk
How fast and in what ways will the competition respond to this result?
To be determined
Who are the partners involved in the result?
UTC
Who are the industrial partners interested in the result (partners, sponsors, etc.)?
ICT GW, 7Bulls
Have you protected or will you protect this result? How? When?
Research publications at the end of the project.

Other results

ResilBlockly

This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.

Security evaluation methodology

Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…

Monitoring Tool

The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.

Extended MUD file

The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This