Abstract:
A method reduces cache memory requirements for testing a multiplicity of flows. The method includes receiving data corresponding to a frame in a particular flow among the multiplicity of flows. In response to the frame received, the method updates a set of cached flow counters in cache memory for the particular flow. The method updates one or more regular operation counters and one or more conditional counters among the set of cached flow counters, including a last serviced counter. The method updates, responsive to any error conditions, one or more error condition counters among the set of cached flow counters. The method evaluates whether to transfer values from the cached flow counters to system accumulators in system memory using at least a value in the last serviced counter for the particular flow. Responsive to the evaluating, the method transfers the values from the cached flow counters to the system accumulators.
Abstract:
A method of and apparatus for monitoring a computer system includes defining a monitoring policy for the computer system. At least one computer is employed to determine a status of a state of the computer system relative to the monitoring policy. At least one computer is employed to determine a condition of at least one monitored element to be monitored in the computer system based on the status of the state of the computer system. Furthermore, at least one computer is employed to monitor the condition of the at least one monitored element in the computer system, based on the monitoring policy. At least one computer is employed to perform an action in response to the condition assuming a predetermined status.
Abstract:
A method, system, and computer program product for monitoring the response time for a web service provider is provided. In one embodiment, receiving a web service inbound transaction is received at a web service proxy server. The web service proxy server invokes a response time monitoring service and provides the response time monitoring service with a unique transaction identifier for the inbound transaction. The web service proxy server also invokes, on the web service provider, a web service requested by the inbound transaction. The proxy server later receives an outbound transaction from the web service provider corresponding to the original inbound transaction and invokes the response time monitoring service, once again, providing the unique transaction identifier to the response time monitoring service. The response time monitoring service determines a time for the inbound transaction and for the outbound transaction corresponding to the same unique transaction identifier and sets a response time as the difference in times between the time for the outbound transaction and the time for the inbound transaction.
Abstract:
In one implementation, an interactive service management system includes a performance profile module and a performance evaluation module. The performance profile modules defines a performance measure of an interactive service based on a quality assessment associated with the interactive service. The performance evaluation module compares the performance measure with performance target associated with the interactive service, and modifies the performance target associated with the interactive service based on the comparison of the performance measure and the performance target.
Abstract:
An application distribution server may be operable to select a plurality of data processing devices which are capable of receiving application updates. One or more experimental versions of an application may be communicated by the application distribution server to each of the selected plurality of data processing devices during an update process of the application. The application distribution server may cause collection of performance information associated with the one or more experimental versions. The application distribution server may then cause communication of the collected performance information to a developer of the application for analysis. When a particular experimental version is uninstalled from a particular data processing device or when feedback and/or rating information on the particular experimental version is communicated from the particular data processing device, the application distribution server may communicate, to the particular data processing device, a message indicating an experiment and options to opt-out of future experiments.
Abstract:
A log file processing system sorts records from large log files and groups them by session without making a complete copy of the log files by capturing a subset of the log files in a sliding memory window and identifying all records in the window that form a complete user session. Records belonging to a complete session are output for analyzing, and the remaining records are output as raw log data for additional processing. Using a ring buffer to implement the sliding memory window, data structures are used to group records by session, to identify completed sessions, and to index into the ring buffer to retrieve records for completed sessions that are to be directly analyzed. Any records remaining in the ring buffer at the end of slide window processing may be output as raw log file data and are processed as incomplete or malformed session records. An embodiment of the log file processing system provides a significant improvement on the speed of data extraction from log files into analyzable session data.
Abstract:
A method of controlling webpage behaviour on a web enabled device 3 in order to assist in, for example, collection of monitoring information, preserving session context, and improving security. The method includes monitoring a user interaction with a webpage (step 203), using a client side module 31 at the web enabled device 3, and determining whether predetermined conditions are satisfied (step 204). Where the predetermined conditions are satisfied the further steps below are carried out: capturing details concerning an intended result of said user interaction (step 205), using the client side module; at least temporarily preventing occurrence of the intended result of said user interaction using the client side module (step 206); carrying out additional processing (step 207) using the client side module; determining a controlled result (step 208), using the client side module, in dependence on said intended result and the additional processing; and causing the controlled result to occur (step 209). The additional processing might, for example, include collecting monitoring information, dynamically re-writing the URL to allow preservation of session context, or performing in checks or modifications to improve security.
Abstract:
A method for automatically gauging a benefit of a tuning action. The method including collecting a plurality of observations of a running state of a plurality of threads in a computer system, as executed by a processing in a computer system. Identifying a plurality of resources the computer system and a capacity of each resource of the plurality of resources. Mapping an observation of the running state of each thread of the plurality of threads to a resource that the observation of each thread uses, respectively. Applying the tuning action to a first resource of the plurality of resources to determine an impact on the performance of the computer system.
Abstract:
A computer program product for automatically gauging a benefit of a tuning action. The computer program product including a computer readable storage medium having computer readable program code embodied therewith. The computer readable program code including computer readable program code configured to collect a plurality of observations of a running state of a plurality of threads in a computer system. Computer readable program code configured to identify a plurality of resources of the computer system and a capacity of each resource of the plurality of resources. Computer readable program code configured to map an observation of the running state of each thread of the plurality of threads to a resource that the observation of each thread uses, respectively, and computer readable program code configured to apply the tuning action to a first resource of the plurality of resources to determine an impact on the performance of the computer system.
Abstract:
A method of protecting data on a mobile computing device using a storage network by deploying to the mobile computing device, a synchronization agent and then associating a synchronization policy with the synchronization agent. The mobile computing device is monitored for at least one threshold event. Its determined that the threshold event has occurred which causes a request to initiate a data synchronization event to be transmitted. The response to the request is synchronizing the mobile computing device with the storage network.