Abstract:
One example method includes performing replication operations and/or failure recovery operations for replication operations in a computing system using matrix clocks and replication controllers. The replication controller includes or has access to vectors of a matrix clock. The replication controller also includes a multiplexer. The multiplexer is configured as an m×n multiplexer using the matrix clock to determine m and n. The operation is performed using the configured multiplexer. This allows an imbalance of resources to be managed by the replication controller. The matrix clock can be updated, which may result in the multiplexer being reconfigured.
Abstract:
A process for facilitating autoscaling in a stateful system is described herein. In embodiments, a set of metrics associated with a set of components of a stateful service is obtained. The set of metrics may generally indicate a utilization or a load of each of the components of the set of components (e.g., message managers and/or data stores). Thereafter, it is determined to initiate a scaling event at the stateful service in association with the set of components of the stateful service based on at least a portion of the set of metrics attaining a metric threshold indicating a threshold value for determining whether to scale stateful service components. A scaling request can then be provided to the stateful service to initiate the scaling event at the stateful service in association with the set of components of the stateful service.
Abstract:
A computer-implemented runtime system is operable of providing a continuous product execution runtime environment for an application via a healthcare network. The system includes a focus machine and an action plan repository, to provide an autonomous runtime environment by at least: monitoring a running use case of at least one application on at least one device; taking over responsibility of a running use case of the at least one application, upon an error state being detected for the monitored running use case; analyzing the error state of the running use case detected; obtaining at least one suitable substitution action out of a plurality of actions deposited in the action plan repository, based on the error state of the running use case analyzed; and terminating and completing at least a part of the running use case, by employing the at least one substitution actions obtained, on the at least one application.
Abstract:
One example method includes performing replication operations and/or failure recovery operations for replication operations in a computing system using matrix clocks. Each node or process in a computing system is associated with a matrix clock that reflects streams required and/or available at the source and destination nodes. As the replication operation is performed, the matrix clocks are updated. When a failure is detected or when insufficient streams are available, the nodes may be throttled until sufficient streams are available. The matrix clocks facilitate a recovery line such that replication can resume when sufficient streams are available.
Abstract:
The invention relates to an electronic system comprising an electronic computer, in the presence of an external request to execute a source application whose executable has been previously loaded within a first dedicated area of the memory, being at least configured to:
instantiate a clone application of the source application by:
duplicating the executable of the source application to create the executable of the clone application, and by storing it in a second area of the memory distinct from the one dedicated to the source application, and by generating a request, internal to the computer, to execute said at least one clone application,
execute the source and clone(s) applications independently, generate a single output based on comparing the result of the execution of the source and clone(s) applications.
Abstract:
A device for displaying a document includes a display screen, a human-machine interface, a first memory zone and at least one second memory zone separate from the first memory zone. The zones are configured to contain similar information. A processor is configured to execute a first process and at least one second process when a display request is received via the human-machine interface. Those processes include respectively reading first information in the first memory zone and second information in the second memory zone. That information corresponds to the display request. The processes also include respectively producing a first display layer and a second display layer associated with the display screen, the first display layer and the second display layer being displayed on the display screen superimposed.
Abstract:
Gathering diagnostics during a transactional execution in a transactional memory environment, a transactional memory environment for performing transactional executions is provided. Included is identifying a first indicator, by a computer system, signaling a beginning instruction of a transaction comprising a plurality of instructions; generating, by the computer system, a computed digest based on the execution of at least one of the plurality of instructions; accumulating, by the computer system, a diagnostic data of the transaction based on the execution of the plurality of instructions; identifying, by the computer system, a second indicator associated with the plurality of instructions signaling an ending instruction of the transaction comprising the plurality of instructions; and based on an abort of the transaction, not saving the memory store data of the transaction to memory.
Abstract:
Unifying application log messages using runtime instrumentation includes capturing raw data associated as a log message from an application using an application monitoring module, determining if the raw data is to be filtered based on a filtering configuration, and constructing a log message based on the raw data. A system for unifying application log messages using runtime instrumentation includes a capture engine to capture raw data associated as a log message from an application using an application monitoring module, a determination engine to determine if the raw data is to be filtered based on a filtering configuration, a construction engine to construct a log message based on the raw data, and a log framework monitor engine to monitor an application program interface that invokes a writing action of the log message using at least one log framework to capture the log message in real time.
Abstract:
A power management mechanism maintains power to a processor and an integrated memory. Read-only logic and a cache are also provided. At power on, the read-only logic configures the cache as an internal memory and loads executable instructions in the cache. A copy of the executable instructions is stored in the internal memory. A branch instruction is also stored. Thereafter, the processor uses the copy of the executable instructions and present status information. The processor is programmed to issue a reset signal when a failure is detected. The read-only logic responds to the reset signal by going to the branch instruction in the internal memory, which directs the processor to use the copy of the executable instructions and status information in the internal memory circuit. The operating state is restored and the processor is instructed to execute the next instruction in the copy of executable instructions.
Abstract:
A processing-based bypass “fail open” mode is provided for an intrusion prevention system by a primary process running on a first logical core (lcore) is used as a control plane, which invokes bypass-open run-to-completion threads in other lcores comprising a bypass data plane, and which spawns a secondary process to fully configure intrusion prevention threads on other lcores to create an Intrusion Prevention System data plane. Upon a ready signal from the secondary process, the primary process quiesces such that the secondary process IPS data plane exclusively owns and executes on the other lcores.