-
131.
公开(公告)号:US09983949B2
公开(公告)日:2018-05-29
申请号:US14733545
申请日:2015-06-08
Applicant: FUJITSU LIMITED
Inventor: Takahiro Maekawa
CPC classification number: G06F11/1469 , G06F9/45533 , G06F9/45558 , G06F11/1451 , G06F11/3003 , G06F11/302 , G06F11/3055 , G06F11/3093 , G06F11/3096 , G06F11/3476 , G06F2009/45591 , G06F2201/815 , G06F2201/835 , G06F2201/84 , G06F2201/865
Abstract: A restoration detecting method includes receiving, by a processor, from a monitoring target virtual machine, file size information indicating a file size of a specific file, the file size of which cumulatively increases as the virtual machine runs, and detecting, by a processor, restoration of the virtual machine on a basis of the received file size information.
-
公开(公告)号:US09916211B2
公开(公告)日:2018-03-13
申请号:US15706412
申请日:2017-09-15
Applicant: International Business Machines Corporation
Inventor: Jeffrey Berger , William J. Franklin , Laura M. Kunioka-Weis , Thomas Majithia , Haakon P. Roberts
CPC classification number: G06F11/1469 , G06F11/00 , G06F11/1448 , G06F11/1458 , G06F11/1471 , G06F17/30312 , G06F17/30353 , G06F17/30368 , G06F17/30595 , G06F2201/80 , G06F2201/835 , G06F2201/84
Abstract: A database recovery and index rebuilding method involves reading data pages for a database to be recovered as recovery bases; retrieving all log records from stored post-backup updates and sorting the retrieved log records; as the data pages to be recovered are read, applying the sorted log records to their respective data pages; as the applying completes for individual data pages, extracting and sorting index keys from the individual data pages for which the applying is complete, until all index keys have been extracted from all individual data pages and sorted; on an individual recovered page basis, writing the recovered individual data pages into the database; and when all index keys have been extracted and sorted from all of the recovered individual data pages, rebuilding indexes of the database using the sorted index keys and writing the rebuilt indexes to the non-transitory storage.
-
公开(公告)号:US09910755B2
公开(公告)日:2018-03-06
申请号:US14752756
申请日:2015-06-26
Applicant: Amazon Technologies, Inc.
CPC classification number: G06F11/3409 , G06F11/3006 , G06F11/3082 , G06F11/3433 , G06F11/3452 , G06F11/3476 , G06F17/40 , G06F2201/835
Abstract: A computing resource monitoring service receives a request to retrieve measurement data for a metric. The computing resource monitoring service determines, based at least in part on information included in the request, one or more in-memory datastores where the measurement data is stored. If the information indicates that the computing resource monitoring service is to provide an authoritative subset of the measurement data, the computing resource monitoring service limits the data provided in response to the request to the authoritative subset of the measurement data. Otherwise, if the information does not specify this indication, the computing resource monitoring service will provide the measurement data that is available.
-
公开(公告)号:US20180039552A1
公开(公告)日:2018-02-08
申请号:US15229772
申请日:2016-08-05
Applicant: FREESCALE SEMICONDUCTOR, INC.
Inventor: Avishay Moskowiz , Amitay Beler , Ira Kalman
CPC classification number: G06F11/203 , G06F3/0619 , G06F3/0653 , G06F3/067 , G06F2201/805 , G06F2201/835
Abstract: A server board includes first and second devices. A first service processor of the first device operates as a master baseboard management controller of the server board, and monitors a communication channel for alive messages from a plurality service processors. A second service processor operates as a secondary baseboard management controller, and sets a second timer to a first value. In response to a determination that the second timer has expired based on a first value: the second service processor to start a switchover process, and to set the second timer to a second value based on an alive message period. In response to a primary alive message not being received from the first service processor prior to the second timer expiring based on the second value, the second service processor to reset first service processor and to operate as the master baseboard management controller.
-
公开(公告)号:US20180039436A1
公开(公告)日:2018-02-08
申请号:US15788686
申请日:2017-10-19
Applicant: EMC IP Holding Company LLC
Inventor: Assaf Natanzon , Ran Goldschmidt , Raz Zieber , Anat Inon
CPC classification number: G06F11/1484 , G06F9/45558 , G06F11/1451 , G06F11/2066 , G06F11/2071 , G06F2009/45579 , G06F2009/45587 , G06F2201/815 , G06F2201/835 , G06F2201/84 , G06F2201/855
Abstract: A method, system, and computer program product for intercepting IO to a virtual machine file system by a storage based splitter, replicating, via a replication appliance, the IO to a replica of the image; the replica of the image containing a replica of the virtual machine file system, and periodically mounting the replica of the virtual machine file system to create entries for a database tracking information about the virtual machines running in the hypervisor.
-
公开(公告)号:US09870300B2
公开(公告)日:2018-01-16
申请号:US13688638
申请日:2012-11-29
Applicant: International Business Machines Corporation
Inventor: Kathleen Sharp , Grant J. Shayler , John D. Taylor , Joe Winchester
IPC: G06F3/0485 , G06F11/34 , G06F11/32
CPC classification number: G06F11/3476 , G06F11/323 , G06F2201/835 , G06F2201/86
Abstract: Embodiments of the present invention provide a method, system and computer program product for logged event frequency visualization. In an embodiment of the invention, a method for logged event frequency visualization is provided. The method includes loading into memory of a computer system a set of logged data entries and associated time stamps from a data store of log entries and computing in the computer system a frequency of logging for each of the logged data entries. The method additionally includes concurrently displaying in a log viewer both the logged data entries and also a visualization of the frequency of logging for each of the logged data entries.
-
公开(公告)号:US09870278B2
公开(公告)日:2018-01-16
申请号:US15350137
申请日:2016-11-14
Applicant: International Business Machines Corporation
Inventor: Douglas W. Dewey , Kevin S. Goldsmith
CPC classification number: G06F11/0763 , G06F3/0604 , G06F3/0619 , G06F3/0631 , G06F3/0644 , G06F3/0659 , G06F3/0665 , G06F3/067 , G06F3/0683 , G06F11/0709 , G06F11/0727 , G06F11/073 , G06F11/0751 , G06F11/0778 , G06F11/079 , G06F12/0238 , G06F2201/815 , G06F2201/835 , G06F2212/1032 , G06F2212/152 , G06F2212/154 , G06F2212/263 , G06F2212/657
Abstract: A method of and system for managing spaces in memory of a storage facility is disclosed. The method and system includes storing first and second identifiers in first and second spaces in memory in response to allocating the second space for a set of data. The first identifier is stored in a first field within the first space. The first space has a pointer in a second field. The pointer in the second field indicates an address of the second space. The second identifier is stored within a portion of the second space. In response to an error event, the first and second identifiers may be captured. A determination is made as to whether the pointer is directed to the set of data. The determination is based on a comparison of the first identifier and the second identifier.
-
公开(公告)号:US20180006902A1
公开(公告)日:2018-01-04
申请号:US15422967
申请日:2017-02-02
Applicant: Nicira, Inc.
Inventor: Kaushal Bansal
CPC classification number: H04L67/10 , G06F11/3006 , G06F11/3457 , G06F11/3476 , G06F2201/835 , H04L41/145 , H04L41/22
Abstract: A method of automatically identifying and recreating tenants environment issues in a set of datacenters by a workflow replay tool is provided. Each datacenter includes a network manager server. The method analyzes, by the workflow replay tool, a set of log files generated in the particular tenant's environment to identify tenant's workflows. The method analyzes, by the workflow replay tool, network manager server databases of the tenant's environment to identify the logical entities in the tenant environment used by the identified workflows. The method allocates resources in a lab environment to simulate the tenant's environment. The method reruns the identified tenant's workflows by the workflow replay tool using the allocated resources in the lab environment to recreate tenant environment issues.
-
公开(公告)号:US09823865B1
公开(公告)日:2017-11-21
申请号:US14754819
申请日:2015-06-30
Applicant: EMC Corporation
Inventor: Assaf Natanzon , Ran Goldschmidt , Raz Zieber , Anat Inon
CPC classification number: G06F11/1484 , G06F9/45558 , G06F11/1435 , G06F11/1451 , G06F2009/45579 , G06F2009/45587 , G06F2201/80 , G06F2201/815 , G06F2201/835 , G06F2201/84
Abstract: A method, system, and computer program product for intercepting IO to a virtual machine file system by a storage based splitter, replicating, via a replication appliance, the IO to a replica of the image; the replica of the image containing a replica of the virtual machine file system, and periodically mounting the replica of the virtual machine file system to create entries for a database tracking information about the virtual machines running in the hypervisor.
-
公开(公告)号:US20170286260A1
公开(公告)日:2017-10-05
申请号:US15086057
申请日:2016-03-31
Applicant: QUALCOMM Incorporated
Inventor: Sean Todd BAARTMANS , Zainab ZAIDI
CPC classification number: G06F11/3636 , G06F9/466 , G06F11/3409 , G06F11/3466 , G06F11/3495 , G06F11/36 , G06F2201/835 , G06F2201/87
Abstract: Systems and methods for analyzing performance of a processing system are based on performance counters provided in trace points located at selected nodes of the processing system. A first transaction to be monitored is identified as a transaction to be monitored at a first trace point if the transaction is detected, by a performance counter, more than a threshold number of times at the first trace point. A first trace tag identifier is associated with the first transaction at the first trace point. The first transaction is identified at one or more other trace points based on the first trace tag identifier. Based on time stamps at which the first transaction is identified at the trace points, information such as trace information, latency, locality of a consuming device of the first transaction, etc. is obtained from the various trace points.
-
-
-
-
-
-
-
-
-