Abstract:
A method and system for increasing server cluster availability by requiring at a minimum only one node and a quorum replica set of replica members to form and operate a cluster. Replica members maintain cluster operational data. A cluster operates when one node possesses a majority of replica members, which ensures that any new or surviving cluster includes consistent cluster operational data via at least one replica member from the immediately prior cluster. Arbitration provides exclusive ownership by one node of the replica members, including at cluster formation, and when the owning node fails. Arbitration uses a fast mutual exclusion algorithm and a reservation mechanism to challenge for and defend the exclusive reservation of each member. A quorum replica set algorithm brings members online and offline with data consistency, including updating unreconciled replica members, and ensures consistent read and update operations.
Abstract:
A scanning probe microscope (SPM) based measuring technique for measuring surface features of a sample fits a curve to a family of feature edge points acquired as a result of an SPM scan of the surface feature. If two curves are fit on opposed edges of the feature of interest, the maximum or minimum distance between those curves can be determined to ascertain a dimension of interest such as a maximum via width, a minimum line width, etc. The scan is preferably a relatively low-resolution scan in the Y direction, typically having 8-12 scan profiles passing through the feature of interest low-resolution, which is about half that typically used by prior techniques. The low-resolution scan can be performed relatively rapidly and with high repeatability. Repeatability is also higher than with prior techniques, and the level of repeatability is relatively insensitive to the resolution in the Y direction. Using a low-resolution scan also significantly reduces tip wear and increases throughput when compared to high-resolution scans.
Abstract:
A scanning probe microscope's probe tip dimensions as they exist or existed for a certain data or measurement are inferred based on probe activity taking place since a probe characterization procedure was performed. The inferred probe tip dimensions can be used to correct nanoscale measurements taken by the probe to account for changes in the probe's geometry such as wear.
Abstract:
A method and system for increasing server cluster availability by requiring at a minimum only one node and a quorum replica set of replica members to form and operate a cluster. Replica members maintain cluster operational data. A cluster operates when one node possesses a majority of replica members, which ensures that any new or surviving cluster includes consistent cluster operational data via at least one replica member from the immediately prior cluster. Arbitration provides exclusive ownership by one node of the replica members, including at cluster formation, and when the owning node fails. Arbitration uses a fast mutual exclusion algorithm and a reservation mechanism to challenge for and defend the exclusive reservation of each member. A quorum replica set algorithm brings members online and offline with data consistency, including updating unreconciled replica members, and ensures consistent read and update operations.
Abstract:
In a computer-implemented method of joining a user to a conference call event an interface associated with a time management software application is displayed. The interface displays information relating to the conference call event including a date for a conference call which is subject of the conference call event and a start time of the conference call. While displaying the interface, a menu offering one or more options is displayed; these one or more options include an option to join the conference call. When an indication of a selection of the option to join the conference call is received, information associated with the conference call is located; this information includes a telephone number for a conference call bridge. A connection with the conference call bridge using the telephone number is initiated.
Abstract:
In general, the subject matter described in this specification can be embodied in methods, systems, and program products for correlating status information generated in a computer network. A computing system receives, for each particular computer server or application program in a group of computer servers and application programs that are executing on the computer servers, information that identifies statuses of the particular computer server or application program at a plurality of times. The computing system generates, using the information received, network signatures that each represent statuses of the computer servers and application programs in the group for a particular time, the network signatures being for multiple times. The computer system stores the network signatures along with data that identifies relationships, for each of the multiple times, between (i) application programs and the computer servers on which they were executing, and (ii) application programs that were in communication with each other.
Abstract:
An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts.
Abstract:
An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network.
Abstract:
Payment of non-settlement currencies includes developing a non-settlement currency exchange separate from a financial institution unwilling to assume risks in converting non-settlement currencies. The non-settlement currency exchange includes a predictive model to provide an estimated currency exchange rate. Schemes are provided where a merchant may share currency exchange profit and/or currency exchange losses with a financial institution. The exchange rate may be persisted in subsequent related financial transactions such as a refund, a chargeback, and/or a representment.
Abstract:
In a computer system running at least a first virtual machine (VM) and a second VM on virtualization software, a computer implemented method for the second VM to provide quasi-lockstep fault tolerance for the first VM. The method includes enabling operations of the second VM to diverge from being in lockstep with operations with the first VM without resynchronizing the second VM with the first VM, if output of the second VM is not diverging from output of the first VM. The output of the second VM is compared with the output of the first VM to determine whether the output of the second VM has diverged from the output of the first VM. In response to a determination that the output of the second VM has diverged from the output of the first VM, a resynchronization of the second VM is executed.