Abstract:
A method(s) and system(s) provide a non-intrusive sensing and instrumentation of work processes performed in computing environment. The method includes providing a pre-defined collection of work processes covering the entire activities to be performed by the end user on the IT system. Each of the process steps of the work processes are assigned with a meta-data. The method further includes obtaining a plurality of measures for each of the process step and obtaining task performance metrics by analyzing the plurality of measures. Furthermore, the method includes collecting a set of actions being performed by the user on the IT system. The method further includes identifying the work processes performed by the user and subsequently, identifying the task performance measures of the user by comparing the identified work processes with the task performance metrics.
Abstract:
One or more circular debug buffers can allow terminal output data to be provided from the target system to a host without halting the target system or causing significant delays. One or more circular debug buffers may also allow input (such as keyboard input) to be provided from the host to the target without halting the target system or causing significant delays. Accordingly, communications between the target and host may be performed in real time or near real time. These communications may be used for debugging purposes or more generally, for any purpose, including purposes unrelated to debugging.
Abstract:
A method and a computing system for performing the method. At least two microstates of at least two components of a computing system are organized into at least two macrostates of the computing system. Each microstate represents a state that a component of the computing system is able to individually enter. Each macrostate represents a state that the computing system is able to enter as a whole. The macrostates are organized into attractors. Each attractor is a stable state in which the computing system is stable. An attractor separation map is constructed. The attractor separation map indicates how the attractors are separated from one another by at least two hamming distances. Each hamming distance is a number of bits that differ between two attractors.
Abstract:
A variety of methods, systems, devices and arrangements are implemented for controlling server load-distributions. According to one such computer-implemented method, a desired server load-distribution is assigned for a plurality of computer servers that collectively provide services to computer clients. In response to a computer client request for service, a subset of computer servers is selected from the plurality of computer servers. Weight factors for servers of the selected subset of servers are determined as a function of the overall server load-distribution-profile and the selected subset.
Abstract:
Systems and methods of SOA performance tuning are provided. In accordance with an embodiment, one such method can comprise monitoring a plurality of processing stages, calculating a processing speed for each of the processing stages, and tuning a slowest processing stage of the plurality of processing stages.
Abstract:
Systems and methods of collecting and aggregating log data with fault tolerance are disclosed. One embodiment includes, one or more devices that generate log data, the one or more machines each associated with an agent node to collect the log data, wherein, the agent node generates a batch comprising multiple messages from the log data and assigns a tag to the batch. In one embodiment, the agent node further computes a checksum for the batch of multiple messages. The system may further include a collector device, the collector device being associated with a collector tier having a collector node to which the agent sends the log data; wherein, the collector determines the checksum for the batch of multiple messages received from the agent node.
Abstract:
A method of protecting data on a mobile computing device using a storage network by deploying to the mobile computing device, a synchronization agent and then associating a synchronization policy with the synchronization agent. The mobile computing device is monitored for at least one threshold event. Its determined that the threshold event has occurred which causes a request to initiate a data synchronization event to be transmitted. The response to the request is synchronizing the mobile computing device with the storage network.
Abstract:
A computerized system and method for tracking and reporting online activity across a plurality of clients and servers is disclosed that intercepts and logs secure and non-secure HTTP request and response pages, analyzes each of the received page records, associates each page record to an event type based on user-defined parameters, identifies and extracts user-defined attributes of each page record based on its event type, and reports on the occurrence of the event along with its associated attributes.
Abstract:
A computer-implemented method for recording and replaying user sessions in browser based applications includes initiating a user session as a result of a user accessing an application in a web browser. The computer-implemented method also includes attaching an event handler to the application as a replacement for an original event handler. Further, the computer-implemented method includes executing the event handler in response to an event, wherein the event is a plurality of user actions performed during the user session. Furthermore, the computer-implemented method includes receiving the plurality of user actions as inputs to the application. Moreover, the computer-implemented method includes recording the plurality of user actions and replaying the plurality of user actions recorded at a later time.
Abstract:
A computer-implemented data processing method comprises receiving information from a user computer concerning a desired output to be generated, adding the information concerning the desired output to be generated to a data structure, and adding additional information to the data structure concerning intermediate outputs to be generated. The information concerning the desired output to be generated is received at a host computer. The host computer is one of a plurality of host computers configured to collect and analyze data received from a plurality of source computers. The data structure represents a list of outputs to be generated by the plurality of host computers. The intermediate outputs are precursor inputs needed to generate the desired output. The additional information is added to the data structure based on the information received from the user computer and based on stored information.