Wahren der Integrität einer Ausgabe von Code-Generatoren

    公开(公告)号:DE112013004668T5

    公开(公告)日:2015-07-09

    申请号:DE112013004668

    申请日:2013-06-12

    Applicant: IBM

    Abstract: Ein Verfahren und ein System werden bereitgestellt, um die Integrität der Ausgabe von Codegeneratoren zu wahren. Das Verfahren kann beinhalten: Feststellen einer erzeugten Ausgabe, die aus einem ursprünglichen Modell erzeugt worden ist; Auswerten der erzeugten Ausgabe, um den Inhalt einer abgeleiteten Version des ursprünglichen Modells abzuleiten; Vergleichen der abgeleiteten Version des ursprünglichen Modells mit einer aktuellen Version des ursprünglichen Modells, um Unterschiede in Quellenelementen zu erkennen; und Verwenden der erkannten Unterschiede, um redundante Elemente in der erzeugten Ausgabe zu ermitteln. Der Schritt des Feststellens einer erzeugten Ausgabe kann das Eingeben von Dateien oder von Inhalt eines Dateisystems und ein Reverse Engineering, bei dem angepasste Regeln auf der Grundlage des ursprünglichen Modells angewandt werden, um eine erzeuge Ausgabe zu ermitteln, beinhalten. Der Schritt des Auswertens der erzeugten Ausgabe, um den Inhalt einer abgeleiteten Version des ursprünglichen Modells abzuleiten, kann ein Reverse Engineering der erzeugten Ausgabe beinhalten, bei dem angepasste Regeln auf der Grundlage des ursprünglichen Modells angewandt werden.

    Log storage management in a data processing system using key-pointing

    公开(公告)号:GB2369902B

    公开(公告)日:2004-11-03

    申请号:GB0029790

    申请日:2000-12-07

    Applicant: IBM

    Abstract: A data processing apparatus (10, FIG. 1) has a direct access non-volatile storage device (103) on which log records are stored in one or more log files. The processor (101) allocates storage for the log based on possible future requirements. The processor sets the maximum amount of new data that can be written to the log before a key-point operation is performed. When the maximum is reached a key-point is performed. As a result the maximum possible size of the active data written as part of the next key-point can be calculated and storage is allocated accordingly. Should storage become restricted such that the required storage cannot be allocated the data processing apparatus runs in a restricted mode during which the records that are written to the log are concerned with reducing the size of the active data and therefore the next key-point. In transaction processing this is achieved by: not starting new transactions; not allowing transactions to involve new participants; and only allowing transactions to complete.

    Maintaining integrity of output of code generators

    公开(公告)号:GB2507273A

    公开(公告)日:2014-04-30

    申请号:GB201219023

    申请日:2012-10-23

    Applicant: IBM

    Abstract: A system 100 for maintaining integrity of the output of code generators 100 includes a generated output recognition component 123 for determining generated output 102 which has been generated by a specific code generation application 110 based on an original model 101. An inferred model generating component 124 analyzes the generated output to infer contents of an inferred version 103 of the original model. A comparing component 125 compares the inferred version of the original model with a current version 104 of the original model to detect differences in source elements. A clean-up component 126 uses detected differences to identify redundant elements in the generated output and may archive and/or delete now redundant components of generated output 102 to provide cleaned generated output 105. Generated output may be determined by inputting files or content of a file system and reverse engineering applying customised rules based on the original model to identify generated output. Analyzing the generated output to infer contents of an inferred version of the original model may include reverse engineering the generated output applying customised rules based on the original model.

    Data processing system has optimized key-pointing operation for log record storage

    公开(公告)号:GB2344196A

    公开(公告)日:2000-05-31

    申请号:GB9825785

    申请日:1998-11-26

    Applicant: IBM

    Abstract: A server data processing apparatus (10, Figure 1) has a direct access non-volatile memory storage device (103) having a log file (20, Figure 2) made up of extent files (21,22,23) for storing log records therein. A processor (101) allocates a first extent file (21) to be used for storing 31 log records for recreating a transaction processing environment, in the event of a server failure, arising from, for example, a power loss. Log records are written into the current extent file until it has been completely written with log records and cannot store any more. The processor then allocates a new extent file (22) for storing log records, and then begins a key-pointing operation 34 on the newly-allocated extent file (22) by writing a key-point start record (22A, Figure 4). All the active log records from the first extent file are then stored in the subsequent log records, and a key-point end record (22N) is written.

    Log storage management in a data processing system using key-pointing

    公开(公告)号:GB2369902A

    公开(公告)日:2002-06-12

    申请号:GB0029790

    申请日:2000-12-07

    Applicant: IBM

    Abstract: A data processing apparatus 10, has a direct access non-volatile storage device 103 on which log records eg. bank transactions are stored in one or more log files. A processor 101 sets the maximum amount of new data that can be written to the log before a key-pointing operation needs to be performed. A key-point results in redundant information, such as completed transactions, being erased from the storage device 103 to release or reassign the storage 103 for further transactions. When the maximum amount of data is reached a keypoint is performed. Should storage 103 become restricted such that the required storage cannot be allocated, the data processing apparatus 10 runs in a restricted mode, during which, the records that are written to the log are concerned with reducing the size of the active data. This is achieved by not starting new transactions, not allowing transactions to involve new participants and only allowing transactions to complete.

Patent Agency Ranking