CPC G06F 11/0793 (2013.01) [G06F 8/65 (2013.01); G06F 11/3006 (2013.01); G06F 11/327 (2013.01)] | 20 Claims |
1. A computer-implemented method comprising:
detecting, by one or more processors, an upgrade is available for a system of a first user computing device;
gathering, by the one or more processors, a set of live data from an environment of the first user computing device using a process mining software;
comparing, by the one or more processors, the set of live data from the environment of the first user computing device to a set of historical data stored in a knowledge corpus to identify a second user computing device similar to the first user computing device in terms of one or more factors;
responsive to identifying the second user computing device, performing, by the one or more processors, a pattern recognition between the set of live data from the environment of the first user computing device and the set of historical data stored in the knowledge corpus to generate one or more critical recommendations associated with the upgrade for the system of the first user computing device;
determining, by the one or more processors, if a flow of traffic on the system of the first user computing device is at a higher risk of failure;
responsive to determining the flow of traffic through the system of the first user computing device is at the higher risk of failure, sending, by the one or more processors, an alert notification with the one or more critical recommendations to a user; and
scheduling, by the one or more processors, the upgrade for the system of the first user computing device during a period of time, wherein the period of time is scheduled consistent with the one or more critical recommendations.
|