Described herein are various techniques for managing media related to a construction project, which may relate to one or more buildings to be built and/or renovated as part of the construction project. In accordance with techniques described herein, the media may be managed according to information regarding the construction project that is stored by one or more other systems separate from a media management system. The other systems may be construction information management systems that each store information regarding a construction project, including information relating to planning and/or execution of the construction project. For example, the media management system may generate tags based on the information regarding the construction project, may be trained to recognize features in the media that relate to the tags, and add the appropriate tags to the media based on the recognized features.
A marketing campaign management system that includes a campaign platform that categorizes intended recipient profiles corresponding to intended recipients of marketing campaign messages based on their levels of fatigue. Recipient profiles categorized as “saturated” are then sub-segmented to determine their relative levels of fatigue or saturation. The intended recipient profiles that are most fatigued are removed from a recipients list such that they will not be sent any campaigns until after a rest state has been completed. A transitional safe state ensures that the intended recipient profiles inserted back into the list are not immediately removed once again.
Described herein are various techniques for managing media related to a construction project, which may relate to one or more buildings to be built and/or renovated as part of the construction project. In accordance with techniques described herein, the media may be managed according to information regarding the construction project that is stored by one or more other systems separate from a media management system. The other systems may be construction information management systems that each store information regarding a construction project, including information relating to planning and/or execution of the construction project. For example, the media management system may generate tags based on the information regarding the construction project, may be trained to recognize features in the media that relate to the tags, and add the appropriate tags to the media based on the recognized features.
An ad search engine comprises a click tag parser, a rich media parser, an ad copy database, a request/query processing module, a user interface module and a content preservation module. The ad search engine advantageously receives and stores information about ad placement, context and advertising statistical and metadata in the ad copy database. In response to a query, the request/query processing module searches the ad copy database for advertisements matching the input query. The user interface module receives the results and presents them in a novel user interface composed of an array of tiles where each tiles represents a placement of the advertisement. The present invention also includes a several novel methods including a method for displaying ad search results, a method for generating an ad search result user interface, a method for populating an ad database, a method for ad preservation and a method for generating derived insights.
Methods, systems, and articles of manufacture are provided for defining a privacy zone between an asset platform and an offering platform within a network. A request is received from a customer for an offering to be deployed in association with an asset hosted on the asset platform. The offering has back-end offering logic and front-end offering logic that is operatively configured to collect and transfer a data element associated with the asset to the back-end offering logic. A privacy policy associated with the offering is identified. The front-end offering logic is deployed to the asset platform such that the front-end offering logic is operatively configured to communicate with the asset. A data element collection filter is then generated between the front-end offering logic and the back-end offering logic to control the transfer and the access of the data element in accordance with the privacy policy.
A system for analyzing user consumption of content on web pages or determining user engagement with content comprising a data collection script and an content-engagement-inference engine. The data collection script determines one or more content elements to be measured from a web page and collects description data associated with the one or more content elements. The description data describes information about the one or more content elements. The content-engagement-inference engine creates an inference or analytics result based on the description data. The inference or analytics result describes how the one or more content elements have been consumed by users and then provides the inference or analytics result for users to designated entities.
Methods, systems, and articles of manufacture consistent with the present invention provide for deploying an offering to a customer in a data processing system having an offering platform program operatively connected to a distributed offering network. An offering deployment package including the offering is received from a remote offering platform program. The offering included in the offering deployment package is deployed.
Methods, systems, and articles of manufacture consistent with the present invention provide for deploying an offering to a customer in a data processing system having an offering platform program. A customer asset that is a hardware or software component of a customer device is located. The customer asset and its location on the customer device are identified by the offering. A request to deploy the offering is received. The offering is transmitted to the customer device and enabled on the customer device.
Methods, systems, and articles of manufacture consistent with the present invention provide for deploying an offering to a customer in a data processing system having an offering platform program. The offering platform program includes a web services framework for providing web services. A set of standard web service interfaces is provided.
Methods, systems, and articles of manufacture consistent with the present invention provide for deploying an offering to a customer in a data processing system having an offering platform program. A customer asset that is a hardware or software component of a customer device is located. The customer asset and its location on the customer device are identified by the offering. A request to deploy the offering is received. The offering is transmitted to the customer device and enabled on the customer device.
G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
G06Q 30/06 - Buying, selling or leasing transactions
G06Q 40/00 - Finance; Insurance; Tax strategies; Processing of corporate or income taxes
11.
System and method for dynamically controlling sample rates and data flow in a networked measurement system by dynamic determination of statistical significance
A system and methods for dynamically controlling sample rates and data flow in a distributed networked environment by dynamic determination of statistical significance or characteristics for an unlimited number of data collection scripts concurrently executed on concurrently rendering web pages operating an unlimited number of advertisements. Consumer and media behaviors are sampled on all the different components of the distributed environment to gather information, which is transmitted to a downstream statistical analytics system. The system and methods are configured to balance the communication data flow and load among servers and browsers in this distributed networked environment that are engaged in viewing of online content including online content with one or more advertisements.
Efficiency with respect to traditional techniques is a key issue facing designers of software transactional synchronization mechanisms. Meta-transactional synchronization allows integration of transactional support into an object-oriented programming language, such as the Java language through the existing synchronization structure of the JVM. Meta-transactional synchronization provides source-level transactional operations that co-exist with synchronized operations. An implementation of a shared object in an object-oriented programming language tracks concurrently executing transactions attempting to access the shared object with at least one header word of the shared object.
A system for collecting and presenting information about advertising analytics comprises an ad preparation server, an ad server and an analytics server. The ad preparation server receives advertising assets (e.g., ads) and modifies them to include a data collection script. The preparation server then sends the modified ads to the ad server for delivery along with underlying content to users. The underlying content and modified ads are delivered to client devices that present the content and execute the data collection script. The data collection script collects and sends advertising analytic data back to the analytics server in a non-intrusive manner. The present invention also includes a method for preparing ads, a method for deriving a heat map, a method for generating and sending advertising data, and a method for generating a representation of a focus of attention for a user.
Methods, systems, and articles of manufacture consistent with the present invention provide for deploying an asset platform to an asset in a distributed offering network. The asset platform includes a container and an asset module and offering module implemented on the container. The asset module provides an abstraction of the asset to the offering module such that offer modules may communicate through the container with asset modules in a standard manner.
In a method for using and maintaining user data stored on a smart card, a smart card receives a user data request for the user data stored on the smart card. The smart card determines whether the user data request is a data maintenance request or a data use request. A data maintenance request is for modifying user data stored on the smart card. A data use request is for read only access to user data stored on the smart card. The smart card uses a first process to determine whether to allow the user data request when the user data request is determined to be a data maintenance request. The smart card uses a second process, different from the first method, to determine whether to allow the user data request when the user data request is determined to be a data use request.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G06F 21/77 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
16.
CONSTRUCTION ANALYTICS TO IMPROVE SAFETY, QUALITY AND PRODUCTIVITY
Construction analytics is a method of objectively evaluating data from past and/or current construction projects to drive decision making to produce favorable outcomes. Specifically, data may be collected and stored for past and/or current construction projects to improve the safety, quality and productivity of future projects. The most common hazards may be predicted when a type of work is repeated and measures may be put into place to prevent the hazards from occurring again by using a data set produced from safety inspections, observations and incidents that are categorized by the type of work being performed. Mitigations may be implemented before performing a work activity and selecting problematic materials on a project by searching a database containing all of the deficiencies and non-conformance issues encountered in the past on the particular feature of work.
Embodiments include systems and methods for integrated control of environmental conditions in an equipment enclosure. For example, a novel airflow inlet structure can be installed into a primary airflow path of the equipment enclosure. The airflow inlet structure can include an integrated electrostatic filter sub-structure and an integrated electromagnetic radiation (EMR) control sub-structure. During operation of equipment within the enclosure, air drawn through the equipment enclosure can flow through the primary airflow path in such a way as to flow through the electrostatic filter sub-structure; and the EMR control sub-structure can control EMR emitted by the equipment, such that EMR leaving the enclosure is attenuated to below a threshold level.
Methods, systems, and articles of manufacture consistent with the present invention provide for managing a customer asset, which is a hardware or software component of a remote customer device, in a data processing system having an offering platform program. The customer asset's identity and location are received from an offering. The customer asset is located on the remote customer device using the received customer asset's identity and location. A file system is locally implemented for the customer asset. Information is provided to the customer asset via the locally implemented file system.
The present technology is directed to a system and methods for estimating the impinging elements and traffic paths by an advertisement as it is delivered from its originating ad server to the web server from which the webpage including the advertisement is delivered to an end viewer. The methods are server-based and provide output to a viewer's browser upon receiving a web page as input and yield data for a particular advertisement frame about the various intermediate processes used to deliver the advertisement, for example, frames, pixels, advertisement servers, advertisement networks, advertisement tags, advertisement exchanges, cookies, supply side distribution systems, demand side buying systems, etc.
A system that is an independent measurement system to gauge video consumption or viewing is disclosed. Methods for formulating a universal set of measurements or metrics that is operable across all video players, video-content types, ad (advertisement) networks, display devices, and browsers is also disclosed. This set of measurement or metrics advantageously is configured to operate consistently and equally well regardless of the particular video player, video-content type, network, display devices, and browsers that are used.
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
A system for analyzing user consumption of content on web pages or determining user engagement with content comprising a data collection script and an content-engagement-inference engine. The data collection script determines one or more content elements to be measured from a web page and collects description data associated with the one or more content elements. The description data describes information about the one or more content elements. The content-engagement-inference engine creates an inference or analytics result based on the description data. The inference or analytics result describes how the one or more content elements have been consumed by users and then provides the inference or analytics result for users to designated entities.
A system and methods for simulating human usage of mobile devices by simulating human behavior patterns operating mobile devices and using the simulation of human usage to obtain advertising or other online content specific to certain entities that is displayed on the mobile devices. The advertising or other online content specific to the certain entities is transmitted to an analytics server, where the advertising or other online content is interpreted and deciphered to obtain particular elements that relate to the advertising and online content including, but not limited to, an identification of the specific entity, the size of the advertising or other online content, the locations where the advertising or other online content appears, and the path by which the advertising or other online content travels to the mobile devices for display.
The present invention is directed to system architecture of a measurement platform configured to determine advertisement awareness by consumers and methods for determining advertisement awareness by consumers at low cost. The system architecture is flexible and may be applied to any advertisement and is configured to operate without involvement or approval of the advertiser. The system uses user recognition rather than user recall as an indication of measuring awareness within a publisher's website, by tracking advertisement exposure to consumers and dynamically constructing sample interrogation sets to query consumers.
G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
24.
System and method for dynamically controlling sample rates and data flow in a networked measurement system by dynamic determination of statistical significance
A system and methods for dynamically controlling sample rates and data flow in a distributed networked environment by dynamic determination of statistical significance or characteristics for an unlimited number of data collection scripts concurrently executed on concurrently rendering web pages operating an unlimited number of advertisements. Consumer and media behaviors are sampled on all the different components of the distributed environment to gather information, which is transmitted to a downstream statistical analytics system. The system and methods are configured to balance the communication data flow and load among servers and browsers in this distributed networked environment that are engaged in viewing of online content including online content with one or more advertisements.
A processor-executed access manager with an identity management framework receives a first query from a user of a client device connected to a network for a system. The query seeks information as to identity types supported by the system. The access manager responds to the first query with a list of supported identity types. The supported identity types include at least a hardware device, a role, and a user. The list is retrieved from a global configuration data structure in a global data store. The access manager receives a second query from the user for identities of the hardware devices associated with one of the supported identity types. And the access manager responds to the second query with the identity of a specific hardware device, if the user is permitted to access the specific hardware device according to permissions obtained through the global configuration data structure.
A method for accelerating TCP/UDP packet switching. The method involves determining whether exception processing is necessary; if not, the packet is forwarded to a special stack for expedited processing. Packets requiring exception processing are forwarded to the conventional stack.
H04L 12/851 - Traffic type related actions, e.g. QoS or priority
H04L 12/833 - Marking packets or altering packet priority upon congestion or for congestion prevention
H04L 12/803 - Load balancing, e.g. traffic distribution over multiple links
H04L 12/855 - Traffic type related actions, e.g. QoS or priority for signalling traffic, e.g. operations, administration and maintenance [OAM] or acknowledge [ACK] packets
H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
A system receives notification that at least one user interested in acquiring desired information is within a predefined area. The system receives the desired information from a client located within the predefined area, and electronically transmits the desired information to the at least one user. The desired information is received by the at least one user via a wireless device.
A non-transitory computer readable storage medium including computer readable code that, when executed by a processor, is configured to receive, from a user network device, a first request to execute an application on the user network device. The first request includes a user identification, routing information, and requested application information, encrypted using a public key. The user network device is configured to display the application on a television display device. The code is further configured to decrypt the routing information and requested application information using a private key, send a second request for subscription information to a service provider, receive the subscription information from the service provider, and determine that a license corresponding to the application is associated with the user. The code is further configured to generate and send an application package configured to deploy the application using a Java Runtime Environment on the user network device.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
An optical source is described. This hybrid external cavity laser includes a semiconductor optical amplifier (with a semiconductor other than silicon) that provides an optical gain medium and that includes a reflector (such as a mirror). Moreover, the hybrid external cavity laser includes a photonic chip with: an optical waveguide that conveys an optical signal output by the semiconductor optical amplifier; and a ring resonator (as a wavelength-selective filter), having a resonance wavelength, which reflects at least a resonance wavelength in the optical signal. Furthermore, the photonic chip includes an interferometer that provides optical signals on arms of the interferometer. Control logic in the hybrid external cavity laser thermally tunes the resonance wavelength to match a cavity mode of the hybrid external cavity laser based on measurements of the optical signals from the interferometer.
H01S 3/106 - Controlling the intensity, frequency, phase, polarisation or direction of the emitted radiation, e.g. switching, gating, modulating or demodulating by controlling devices placed within the cavity
H01S 3/10 - Controlling the intensity, frequency, phase, polarisation or direction of the emitted radiation, e.g. switching, gating, modulating or demodulating
H01S 5/30 - Structure or shape of the active region; Materials used for the active region
H01S 5/026 - Monolithically integrated components, e.g. waveguides, monitoring photo-detectors or drivers
30.
System and method for dynamically controlling sample rates and data flow in a networked measurement system by dynamic determination of statistical significance
A system and methods for dynamically controlling sample rates and data flow in a distributed networked environment by dynamic determination of statistical significance or characteristics for an unlimited number of data collection scripts concurrently executed on concurrently rendering web pages operating an unlimited number of advertisements. Consumer and media behaviors are sampled on all the different components of the distributed environment to gather information, which is transmitted to a downstream statistical analytics system. The system and methods are configured to balance the communication data flow and load among servers and browsers in this distributed networked environment that are engaged in viewing of online content including online content with one or more advertisements.
Described herein are various techniques for managing media related to a construction project, which may relate to one or more buildings to be built and/or renovated as part of the construction project. In accordance with techniques described herein, the media may be managed according to information regarding the construction project that is stored by one or more other systems separate from a media management system. The other systems may be construction information management systems that each store information regarding a construction project, including information relating to planning and/or execution of the construction project. For example, the media management system may generate tags based on the information regarding the construction project, may be trained to recognize features in the media that relate to the tags, and add the appropriate tags to the media based on the recognized features.
Method and apparatus for converting language text input into a different language text output. One embodiment may be configured to convert Pinyin into written Chinese language text. Embodiments may provide a language input mechanism that accepts phonetic language input text and generates written language output text, and that also accepts modifications to existing input text and automatically corrects the corresponding output text. Embodiments may display one or more alternative output text words and/or sentences as candidates for the transliteration of the input text. The candidate output words may be ranked according to calculated probabilities, with a most probable candidate appearing first. The user may select from the candidate output text to build an output sentence that represents the correct or preferred transliteration of the input text. A lexicon, language model and history cache of previously selected output text words may be referenced in determining the probabilities of candidate output words.
In general, the invention relates to replicating a source file system stored on a first memory by obtaining a first unread entry from a changelog associated with the source file system, querying the source file system using the first unread entry to obtain a current first object file status, a current first object file path, a current first parent directory status, and a current first parent directory path, determining, based on the querying, whether a first object file on the source file system has changed at some time after the execution of the first unread entry, if the first object file has not changed, performing a first action on a target file system, and if the first object file has changed, performing a second action on the target file system.
G06F 16/178 - Techniques for file synchronisation in file systems
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
A method, and associated system, for enforcing compliance with data definitions in an information or conceptual model. The method includes storing a set of data models, which define model parameter definitions, having a content based on data definitions of the conceptual model. A validator is positioned between a registry service and services use data definitions to define their data parameters. The registry service stores registered services in a service repository. The validator processes a registration request from one of the services that includes the data definitions for the parameters of the service. The processing includes accessing the data models and comparing each of the data definitions to a corresponding model parameter definition. When the registration request is determined compliant with the conceptual model, the service is deployed to the service registry. Typically, only registration requests processed by the validator are deployed to the service registry.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
35.
Method and apparatus for debugging applications in development environments
A method for debugging applications in a development environment. The method may include terminating a thread when a breakpoint is encountered when debugging an application. The method may also include saving input and outputs from an external server invocation.
A processing system is disclosed. The processing system comprises a first integrated circuit. The first integrated circuit includes a processor core, a display interface and memory controller coupled to a first bus interface. The display interface is adapted to display graphical information generated by a graphics engine. A graphics engine is not on the first integrated circuit. The processing system includes a second bus interface for allowing communication with the first integrated circuit via the first bus interface. The second bus interface is adapted to allow for communication to a graphics engine.
G06F 13/14 - Handling requests for interconnection or transfer
G09G 5/36 - Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators characterised by the display of individual graphic patterns using a bit-mapped memory
G06T 1/20 - Processor architectures; Processor configuration, e.g. pipelining
G09G 5/393 - Arrangements for updating the contents of the bit-mapped memory
G09G 5/395 - Arrangements specially adapted for transferring the contents of the bit-mapped memory to the screen
A method for validating a data value, the method including receiving a data value entered into an input field of a software application, obtaining a validation rule corresponding to the input field from a validation rule book, executing the validation rule to determine a validation result, and returning the validation result to the software application.
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
G06F 9/44 - Arrangements for executing specific programs
G06F 17/27 - Automatic analysis, e.g. parsing, orthograph correction
G06F 11/36 - Preventing errors by testing or debugging of software
38.
System and method for dynamically controlling sample rates and data flow in a networked measurement system by dynamic determination of statistical significance
A system and methods for dynamically controlling sample rates and data flow in a distributed networked environment by dynamic determination of statistical significance or characteristics for an unlimited number of data collection scripts concurrently executed on concurrently rendering web pages operating an unlimited number of advertisements. Consumer and media behaviors are sampled on all the different components of the distributed environment to gather information, which is transmitted to a downstream statistical analytics system. The system and methods are configured to balance the communication data flow and load among servers and browsers in this distributed networked environment that are engaged in viewing of online content including online content with one or more advertisements.
One embodiment of the present invention provides a system that facilitates efficient transactional execution. The system starts by executing a transaction for a thread, wherein executing the transaction involves placing load-marks on cache lines which are loaded during the transaction and placing store-marks on cache lines which are stored to during the transaction. Upon completing the transaction, the system releases the load-marks and the store-marks from the cache lines which were load-marked and store-marked during the transaction. Note that during the transaction, the load-marks and store-marks prevent interfering accesses from other threads to the cache lines.
A method and a system for providing undo/redo capabilities in mixed model editors. More specifically, the method and system relate to undoing modifications made in a first edit context such that the result can correctly be displayed in a second edit context. Further, the modifications made may be tracked in the multiple contexts and organized such that the modifications are undone and redone correctly.
Methods and apparatus provide for a busy resource encoder to allow for a finer control of spin versus yield decisions. Specifically, the busy resource encoder allows for the execution a first thread, where the first thread is using a particular resource. Additionally, the busy resource encoder allows for the execution of a second thread, where the second thread requires use of the resource which is locked due to first thread execution. The busy resource encoder creates a busy code to indicate the progress of the execution of the first thread in relation to use of the resource by the first thread. The second thread can then read the busy code to determine to execute one of a spin and a yield routine by the second thread.
A processing thread obtains an initial status of a reference field associated with an object having data stored in memory. The reference field represents, at least in part, a status of current modification operations (e.g., a status of moving the object from one location in memory to another), if any, applied to the object. The processing thread applies a sequence of instructions to data retrieved from the object to produce computational results for storage in the object. Prior to storing the computational results in the object, the processing thread can confirm whether the reference field has changed since obtaining the initial status.
Various methods and apparatuses are described for a server that includes at least a server starter program, a monitor program, and a service program. The server starter program runs resident on a computer readable storage medium. The server starter program contains code scripted to start and stop server applications. The monitor program also runs resident on the computer readable storage medium. The monitor program contains code scripted to detect a failure associated with a first server application and to communicate to the server starter program to re-start one or more server applications based upon the detected failure associated with the first server application. The service program registers as an operating system service with the operating system. The service program controls requests and communicates to the operating system on behalf of the first server application in the server.
In shared-memory computer systems, threads may communicate with one another using shared memory. A receiving thread may poll a message target location repeatedly to detect the delivery of a message. Such polling may cause excessive cache coherency traffic and/or congestion on various system buses and/or other interconnects. A method for inter-processor communication may reduce such bus traffic by reducing the number of reads performed and/or the number of cache coherency messages necessary to pass messages. The method may include a thread reading the value of a message target location once, and determining that this value has been modified by detecting inter-processor messages, such as cache coherence messages, indicative of such modification. In systems that support transactional memory, a thread may use transactional memory primitives to detect the cache coherence messages. This may be done by starting a transaction, reading the target memory location, and spinning until the transaction is aborted.
Methods and apparatuses are presented for managing remote computers that are separated from their manager by a firewall. In one or more embodiments, the apparatus includes one or more computer sub-systems managed by the remote manager. Each sub-system includes a processor and a communication interface coupled to the processor, where the communication interface is further coupled to the remote manager via a network. A firewall is implemented between each sub-system and the remote manager such that the firewall blocks accesses to the sub-system from the remote manager. Notwithstanding the presence of the firewall, and without an specific routing through the firewall, each sub-system receives configuration commands from the remote manager through as a text feed.
A system and method for secure generation and distribution of digital encryption keys is disclosed. The system may also be used to protect and distribute other types of secure information, including digital, audio, video, or analog data, or physical objects. The system may include a tamper-respondent secure token device, which may be configured to destroy or disable access to the secure information contained therein in response to attempts to physically or electronically breach the device. Outputs may be provided in a secure manner through various interfaces without using electricity (wires) or electromagnetic radiation. Inputs may be provided in a secure manner, including through the use of a gesture-based input interface. Destruction or disablement of the device and/or its secure contents may be provided upon detection of tamper attempts or upon input of a self-destruct command. Proof of the destruction or disablement of the device or its contents may be provided.
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
A multi-grid mechanism using peer-to-peer (P2P) platform protocols. An autonomic grid computing mechanism may be used to implement a multi-grid grid computing system. In the multi-grid grid computing system, there may be multiple master nodes, and thus multiple smaller grids (or grid cells) each including one or more compute nodes, in a single (larger) grid. A job submitter node may use one or more P2P platform protocols to discover the master nodes and to obtain information about the grid cells, including information that may be used by the job submitter to automatically select one of the grid cells that is suitable to execute a particular job. After selecting the grid cell, the job submitter may submit the particular job to the master node of the grid cell using the P2P platform protocols.
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
48.
Integrating software-tests with software development environments or tools that can assist software-testing
A dynamic-bridge connects a collection of tests (e.g., proprietary tests) to a testing-framework and effectively allows the collection of tests to interface with the testing-framework, thereby allowing the development environment and tools that support the testing-framework to also support the collection of tests. The dynamic-bridge provides a dynamic test wrapper which can be dynamically constructed for a test and present it as a test which conforms to or is compatible with the testing-framework and executed within the testing-framework. Test results are reported in a form that is expected or acceptable by the framework. In effect, the dynamic test wrapper simulates executing the test in the testing framework. As a result, tools which have been integrated with the testing-framework can be used to support tests which may originally not conform or be compatible with the testing-framework.
Systems and methods for controlling mobile devices are provided. A Bluetooth signal is received at a mobile device. The Bluetooth signal may include a broadcaster request which is configured to convey a set of desired actions to the wireless handheld device. Once the signal is received, the mobile device is able to determine if each action in the set of desired actions conveyed by the broadcaster request would be allowable on the mobile device. Then, the device performs each of the actions which have been determined to be allowable on the receiving device.
One embodiment of the present invention provides a system that facilitates modifying a platform-independent programming language build tool to aid in the development and testing of smart card applications. The system operates by creating a task in the platform-independent programming language build tool that allows a user to perform functions associated with the development and testing of smart card applications. Next, the system extends the platform-independent programming language build tool interface to include the task so that the task is executable by the user. Note that making the task part of the platform-independent programming language build tool interface reduces the overhead involved in performing functions associated with developing and testing smart card applications.
One embodiment of the present invention provides a system that profiles software code to dynamically tune a virtual machine for responsiveness and/or throughput. First, the system profiles software code to track a need for a higher level of responsiveness and/or throughput. The system then gathers statistics for system behavior through the profiling techniques while executing the profiled software code, and uses these statistics to dynamically tune a virtual machine.
A system for atomic file transfer operations over connectionless network protocols includes a processor and a memory coupled to the processor. The memory contains program instructions executable by the processor to implement an operating system including a system call interface for sending one or more data files to another system over a network via a connectionless network protocol. In response to an invocation of the system call by an application, the operating system is configured to send the one or more data files to the other system over the network without the application copying contents of the data files into application address space.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 29/06 - Communication control; Communication processing characterised by a protocol
53.
Method and apparatus for profiling a virtual machine
One embodiment of the present invention provides a system for profiling a virtual machine on an embedded device. During operation, the system receives an operation-request at a system-level profiler from a virtual machine on an embedded device. The system then records the operation-request in a system-level log. Next, the system sends the operation-request to a native layer on the embedded device. Then, the system receives an operation-response associated with the operation-request from the native layer. The system then records the operation-response in the system-level log. Next, the system sends the operation-response to the virtual machine, thereby facilitating logging of interactions between the virtual machine and the native layer. Note that logging interactions between the virtual machine and the native layer facilitates emulation of the platform independent virtual machine on a second device. Furthermore, note that logging interactions between the virtual machine and the native layer can facilitate emulation of the platform independent virtual machine executing a specific application on a second device.
A system and method for configuring servers in a cluster. The method may include storing one or more base configuration files associated with an application in a domain administration server, deploying the base configuration files onto one or more servers in a cluster of servers, making one or more instance-specific modifications to the base configuration files, and executing the application in accordance with the one or more modified base configuration files. In various embodiments, the base configuration files may be XML files, and the modifications may be xpath expressions. An alternate embodiment of the method may include storing one or more configuration files based on a common template and representing a platform-specific configuration of a server in a domain administration server, deploying the configuration files onto one or more servers in a cluster of servers, and configuring the servers in accordance with the configuration files.
An Infiniband port can be provided. The port can have an input buffer for storing received data, a flow control manager operable to detect an available space in the input buffer, and a packet generator operable to generate a flow control packet to advertise available space in the input buffer to a remote device transmitting data for storage in the input buffer. The flow control manager can be operable to trigger the packet generator to generate a flow control packet on the basis of at least one of a timer, a received data quantity characteristic for the input buffer and a buffer utilization characteristic for the input buffer.
There are provided mechanisms and methods for automating management of Scalable Distributed Persistent Applications (SDPA) in a grid computing environment. These mechanisms and methods make it possible for physical and operating system resources in the grid to be dynamically allocated and/or de-allocated based upon the results of monitoring performance and monitoring usage of physical and operating system resources.
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
H04L 12/919 - Dynamic resource allocation, e.g. in-call renegotiation requested by the user or upon changing network conditions requested by the network initiated by the source endpoint
H04L 12/923 - Dynamic resource allocation, e.g. in-call renegotiation requested by the user or upon changing network conditions requested by the network initiated by the network
H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
H04L 5/00 - Arrangements affording multiple use of the transmission path
One embodiment of the present invention provides a system that executes an application designed for one application framework in a different application framework. First, the system receives an application designed to operate in the first application framework. The system determines a first set of security permissions used by the application in the first application framework, and maps these security permissions into a second set of security permissions associated with the second application framework. The system then configures the second application framework to provide the second set of security permissions. These steps allow the application to execute transparently in the second application framework with substantially similar security behavior as in the first application framework.
A system for atomic file transfer operations over connectionless network protocols includes a processor and a memory coupled to the processor. The memory contains program instructions executable by the processor to implement an operating system including a system call interface for sending one or more data files to another system over a network via a connectionless network protocol. In response to an invocation of the system call by an application, the operating system is configured to send the one or more data files to the other system over the network without the application copying contents of the data files into application address space.
A magnetic sensor including a first layer that is a pinned layer, the first layer having a first edge. The magnetic sensor includes a second layer that is a non-magnetic metal layer, the second layer having a second edge corresponding to the first edge. The second layer is adjacent the first layer. The magnetic sensor includes a third layer that is a free layer, the third layer having a third edge corresponding to the first edge and the second edge. The third layer is adjacent the second layer. The magnetic sensor also includes a fourth layer that is a flux guide layer. The fourth layer is adjacent the third layer. The fourth layer extends outwardly from the third layer relative to the first layer and the second layer.
A method, apparatus, and system are directed toward configuring a dependency relationship between resources in a cluster. A dependency relationship between a dependent in a first resource group and a dependee in a second resource group is declared. The dependency relationship might include a locality based qualifier and/or a time based qualifier. The locality based qualifier includes a Local Node, Any Node, or From Resource Group Affinity relationship. The time based dependency qualifier includes a Strong dependency, Weak dependency, Online Restart dependency, or Offline Restart dependency. The declaration might be made using a graphical user interface, property list, configuration file, or the like. A candidate node on which to activate the first resource group is determined. The dependent is brought online on the candidate node based on whether an instance of the dependee is online on a node specified by the locality based qualifier.
One embodiment of the present invention provides a system for testing an application running on a virtual machine. Note that this involves the system profiling the application, and determining when the virtual machine is executing code in response to commands from the application and when a device hosting the virtual machine is executing code in response to commands from the virtual machine. During operation, the system executes the application. In response to executing the application, the system receives a code-level log associated with the application from a code-level profiler. Then, using a system-level profiler, the system creates a system-level log associated with the application. Next, the system combines the code-level log and the system-level log to produce a profile of the application. The system then analyzes the profile to determine if a problem exists in the application. Note that this can include identifying performance bottlenecks and “hot spots,” which is code that is continually or frequently executed, and thus, facilitating removing application bugs and improving application efficiency.
A processing system is disclosed. The processing system comprises a first integrated circuit. The first integrated circuit includes a processor core, a display interface and memory controller coupled to a first bus interface. The display interface is adapted to display graphical information generated by a graphics engine. A graphics engine is not on the first integrated circuit. The processing system includes a second bus interface for allowing communication with the first integrated circuit via the first bus interface. The second bus interface is adapted to allow for communication to a graphics engine.
Orchestrated group communication may facilitate communication with a group of contacts. A user may define a group of contacts reachable via different communication mechanisms. A communication framework may determine an appropriate method for communicating the information to each member of a group. The user may not know how the communication framework is communicating with each group member. A user may specify preferred communication mechanisms or a particular order of communication mechanisms for communicating with particular contacts. Orchestrated group communication may also provide a user interface allowing a user to request communication with every member of a contact group via a single user interface action. A user desiring to communicate with a group may drag a document, or other file, and drop it onto an icon for the group and a group communication framework may communicate that document to each member of the group.
A user interface includes a parent node comprising a plurality of child nodes, where the parent node and the plurality of child nodes are related in accordance with a hierarchical structure, and a pagination utility is configured to display a paginated page for a paginated node, where the paginated node is a child node from the plurality of child nodes, where the paginated page includes a portion of data associated with the paginated node, and where the paginated utility is displayed with a sibling node of the paginated node.
G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
65.
Load balancing in multi-grid systems using peer-to-peer protocols
A load-balancing mechanism for grids in a multi-grid network. Using embodiments, one or more job submitters may distribute jobs to grids in a multi-grid network according to the load of the grids, thus spreading the load of jobs to be processed among the grids and helping to insure that jobs are handled in a timely fashion. In one embodiment, a job submitter may use peer-to-peer platform protocols to obtain load information about the grids, and then use the information about the grids to select one of the grids to perform a particular job according to the load of the grids. Determining the load on the grids may be based on information acquired from the grids including one or more of, but not limited to, how many jobs are pending in a grid's job queue and estimated time for completing the jobs in the grid's job queue.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
66.
Method for using and maintaining user data stored on a smart card
In a method for using and maintaining user data stored on a smart card, a smart card receives a user data request for the user data stored on the smart card. The smart card determines whether the user data request is a data maintenance request or a data use request. A data maintenance request is for modifying user data stored on the smart card. A data use request is for read only access to user data stored on the smart card. The smart card uses a first process to determine whether to allow the user data request when the user data request is determined to be a data maintenance request. The smart card uses a second process, different from the first method, to determine whether to allow the user data request when the user data request is determined to be a data use request.
G06Q 20/34 - Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
G06F 21/77 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
G07F 7/10 - Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card together with a coded signal
G06Q 20/10 - Payment architectures specially adapted for home banking systems
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
67.
System for defining non-native operating environments
Methods and systems for defining the partitioning between operating system environments are provided. In this method, network resources, devices, and pseudo-filesystems, etc. can be partitioned. This method provides the capability to support services from native and foreign operating environments without colliding on fixed resources. This method simplifies the task of supporting multiple different operating environments. By assigning each operating environment to its own zone, multiple instances of a single operating environment or multiple different operating environments can be simultaneously supported on a single operating system kernel.
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
A corrosion-resistant magnetic sensor and a method for making the corrosion-resistant magnetic sensor. The magnetic sensor includes a first layer that is a pinned layer, the first layer having a first edge. The magnetic sensor also includes a second layer that can be a non-magnetic metal layer, the second layer having a second edge corresponding to the first edge, wherein the second layer is adjacent the first layer. The magnetic sensor also has a third layer that can be a free layer, the third layer having a third edge which projects outwardly relative to the first edge and the second edge.
A computer including a microprocessor, a memory system, a bus system, and a single point indicator. The memory system includes an operating system stored therein. The bus system couples the memory system to the microprocessor. The single point indicator is coupled to the microprocessor and is capable of emitting a single point of light of substantially any wavelength in a visible spectrum. The computer also includes logic that determines a level of a selected operational parameter of the computer and logic that generates a corresponding wavelength of light emitted from the single point indicator. The corresponding wavelength of light corresponds to the level of the selected operational parameter. A method for indicating a level of a selected operational parameter of a computer is also disclosed.
A method, apparatus and computer program product for an external, self-initializing FIFO containing indexes of free CAM memory locations is presented. When data is sent to the CAM for a lookup, this external FIFO provides the CAM with the index of a free memory location within the CAM so that if the data word is not found in the CAM (i.e. a CAM miss), the data can be written to the designated available free entry in the CAM. Thus, if the same data word is searched in the CAM in the following cycle it will result in a hit.
A statistic tool is provided for use in relation with a group of nodes in which each node has a statistic server configured to maintain application-related statistical data on local execution in the node. The statistic tool comprises a statistic manager for storing centralized statistical data obtained from the nodes and an intermediary server for processing a request from another computer system concerning the execution of an application by gathering statistical data received from those of the nodes that intervene in the execution of the application.
A method for executing an executable file. The method includes executing instructions in the executable file by a first process, receiving a write request from a second process to write to the executable file, generating an anonymous file from the executable file in response to the write request, executing the anonymous file by the first process, and accessing the executable file by the second process.
In a method for interacting with a system that includes physical devices that are interfaced with computer software, a graphical representation of a physical device that can be graphically interconnected with a graphical representation of a software module is generated. The graphical representation of the physical device is capable of being represented as either a graphical copy mode representation or a graphical ghost mode representation. On-screen interaction with functionality of the physical device is enabled when the graphical representation of the physical device is in the graphical copy mode representation. A true physical state of the physical device is tracked when the graphical representation of the physical device is in the graphical ghost mode representation. The tracking of the true physical state of the physical device disables on-screen interaction with functionality of the physical device. A dual-mode graphical user interface element for interfacing with a physical device also is described.
G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
74.
System and method for processing user interface events
A system and method to detect and prevent non-human interaction between a client and a web server invokes an effect to change the event generation behavior at the client. Subsequent event streams from the client to the server are analyzed to determine whether the event streams contain events corresponding to expected reactions of a human operator at the client to the effect. Indications of non-human behavior may invoke more direct human testing, for example using a dynamic CAPTCHA application, or may cause a termination of the client/URL interaction.
A method for queuing thread update buffers to enhance garbage collection. The method includes providing a global update buffer queue and a global array with slots for storing pointers to filled update buffers. The method includes with an application thread writing to the update buffer and, when filled, attempting to write the pointer for the update buffer to the global array. The array slot may be selected randomly or by use of a hash function. When the writing fails due to a non-null slot, the method includes operating the application thread to add the filled update buffer to the global update buffer queue. The method includes, with a garbage collector thread, inspecting the global array for non-null entries and, upon locating a pointer, claiming the filled update buffer. The method includes using the garbage collector thread to claim and process buffers added to the global update buffer queue.
A method for specifying the layout of computing system resources includes receiving a request for a virtual machine, the request comprising a processor requirement and a memory requirement, gathering resource groupings, each resource grouping comprising a latency penalty between a processor and at least a memory. The method further includes calculating a proportionality for each resource grouping, wherein the proportionality comprises a minimum of: an amount of the processor requirement the resource grouping can satisfy and an amount of the memory requirement the resource grouping can satisfy, sorting the resource groupings based on at least the proportionality for each resource grouping to create an ordered list and binding, based on the ordered list, at least one resource group to the virtual machine, wherein the at least one resource group satisfies the processor requirement and the memory requirement.
An external security device is provided in the communication path between devices of different security levels. A higher security device needs only to trust the security of the external device, rather than relying on operating system and file system software that cannot be assured. The external security device blocks access requests that may be using covert channels, but returns status information that indicates that the request is successful. The external security device may then audit access requests to provide a higher level of accountability. The external security device also handles data duplication to prevent or significantly reduce the threat of traffic analysis.
A method for automating provisioning of services in a target computer system. The method includes providing a set of provisioning adaptors each defining an interface to a provisioning application and receiving a provisioning request from a user interface. The method further includes identifying one of the provisioning applications for completing a provisioning operation based on the received provisioning request, and then, invoking the identified one of the provisioning applications using one of the interfaces defined by one of the provisioning adaptors associated with the provisioning tool or application. The method includes providing agents on the components of the target computer system collecting configuration regarding the components from the provisioning agents, and using the collected data during identifying provisioning applications and invoking the identified applications. Dependencies are determined during the method that need to be complied with during provisioning, and the method includes ensuring compliance with these dependencies.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
79.
Mechanism for data diffusion and evaporation across networks
In one embodiment, a method and apparatus for a mechanism for data diffusion and evaporation across networks is disclosed. The method includes maintaining event data of a data management network at individual agents in the data management network without utilizing a central management server and diffusing event data between the individual agents by randomly selecting an event data entity from a local cache of an agent of the individual agents, and transmitting a copy of the randomly selected event data entity into a cache of another agent of the individual agents via a random connection created between the agent and the another agent. Other embodiments are also disclosed.
An apparatus for controlling a target device including a first input device configured to provide a first input to the target device, a second input device configured to provide a second input to the target device, and a control mixer configured to generate an output using a policy, the first input and the second input, wherein the output comprises a feedback and a target device output, wherein the feedback comprises some function of the state of the target device, the policy, and the state of each input device connected to the control mixer.
A method and system for e-mail message user notes. E-mail servers may attach and store user notes with e-mail messages. An e-mail server may store user notes as part of user-profiles. Servers may provide notes to e-mail clients as e-mail header fields in e-mail messages and may generate custom header field names from user input. E-mail servers may associate notes with messages only when communicating with a specific e-mail client or may provide different notes for different e-mail clients. E-mail servers may provide custom views including user notes to web browser based e-mail clients. E-mail clients may allow users to specify a set of predefined notes from which specific notes may later be attached to e-mail messages.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
82.
Method and apparatus for performing lock-free updates in a linked list
One embodiment of the present invention provides a system that performs a lock-free update to one or more fields in an existing node in a linked list. To perform the update, the system first obtains a new node to be added to the linked list, wherein other processes do not possess references to the new node and therefore cannot initially access the new node. Next, the system copies a snapshot of the existing node to the new node, and then updates one or more fields in the new node that correspond to the one or more fields in the existing node. Next, in a single atomic operation the system modifies a next pointer of the existing node to point to the new node and also marks the next pointer to indicate that the existing node is deleted. In this way, the new node becomes part of the linked list and the existing node is deleted in a single atomic operation.
A method for offloading includes a host channel adapter (HCA) receiving a first work request identifying a queue pair (QP), making a first determination that the QP is a proxy QP, and offloading the first work request to a proxy central processing unit (CPU) based on the first determination and based on the first work request satisfying a filter criterion. The HCA further receives a second work request identifying the QP, processes the second work request without offloading based on the QP being a proxy QP and based on the first work request failing to satisfy the filter criterion. The HCA redirects a first completion for the first work request and a second completion for the second work request to the proxy CPU based on the first determination. The proxy CPU processes the first completion and the second completion in order.
A system and method for profiling runtime system events of a computer system may include associating a data source type with detected system events. The system events may be detected dependent on information included in a reply message received by a processor in response to a data request or other transaction request message. The reply message may include information characterizing a source type of a source of data included in the reply message. The source type information may indicate that the source is remote or local; that it is a shared or a private storage location; that the data is supplied via a cache-to-cache transfer; or that the data is sourced from a coherency domain other than that of the requesting process. Instructions, events, messages, and replies may be sampled, and extended address information corresponding to the samples may be stored in an event set database for performance analysis.
A method for reclassifying stored objects without the need to re-access or evaluate directly such objects comprises receiving an object to be stored in a storage system and then associating metadata with the object. The metadata is then stored in a data storage system. The metadata is subsequently used to create a plurality of classification recommendations associated with the object. A storage system implementing the methods of the invention includes one or more physical storage means and a controller that executes one or more steps of the invention.
A method for sharing a network interface among multiple hosts and includes providing a network interface, associating a first set of the plurality of memory access channels with a first host, and associating a second set of the plurality of memory access channels with a second host is disclosed. The network interface including a plurality of memory access channels.
A system and method for data storage and retrieval include a rotational head carriage unit having a plurality of heads. A tape drive unit moves a tape media length-wise across the head carriage unit while the head carriage unit rotates. The tape drive unit is adapted to use a tape comprising multiple recordable layers. The heads are adapted to read data from or write data to one recordable layer while rotating toward one edge of the tape media, and read data from or write data to another recordable layer while rotating toward the other edge of the tape media.
G11B 7/003 - Recording, reproducing or erasing systems characterised by the shape of the carrier with webs, e.g. belts, spooled tapes or films of quasi-infinite extent
G11B 15/18 - Driving; Starting; Stopping; Arrangements for control or regulation thereof
G11B 21/04 - Automatic feed mechanism producing a transducing traverse of the head in a direction which cuts across the direction of travel of the recording medium, e.g. helical scan
G11B 15/61 - Guiding record carriers on drum, e.g. on drum containing rotating heads
G11B 5/29 - Structure or manufacture of unitary devices formed of plural heads for more than one track
88.
System and method for managing privacy for offerings
Methods, systems, and articles of manufacture consistent with the present invention provide for managing privacy in a data processing system having an offering platform. A privacy policy is mapped to a data elements that are transmitted to remote offering platforms. The remote offering platform complies with the privacy policy to ensure data security.
In one embodiment, a method and apparatus for collaborative data redundancy for configuration management database is disclosed. The method includes requesting, by a server of a configuration tracking system, an agent of the configuration tracking system to retrieve asset data when a copy of the asset data located in the server becomes corrupted, retrieving by the agent the requested asset data from one or more assets, and transferring by the agent the asset data to the server without utilizing data redundancy services performed outside of the configuration tracking system. Other embodiments are also disclosed.
A system for characterizing vibration of a rack structure having at least one hard disk drive disposed therein and a vibration exciter operatively associated with the rack structure includes one or more computers. The one or more computers are configured to command the vibration exciter to provide vibration input to the rack structure and to command a plurality of reads from the at least one hard disk drive such that, for each of the plurality of reads, data stored on the at least one hard disk drive is retrieved from the at least one hard disk drive. The one or more computers are also configured to obtain read rate information related to the plurality of reads and to identify at least one resonant frequency of the rack structure based on the read rate information.
A system that generates a model for an electronic prognostics system which is used to monitor a computer system while the computer system is operating correctly. During operation, the system receives telemetry signals generated by the computer system. Next, the system builds the model based on the telemetry signals, wherein the model uses correlations between different telemetry signals to identify anomalies in the telemetry signals. The system then validates the model against telemetry signals from the computer system.
Methods and apparatuses are presented for managing remote computers. In one or more embodiments, the apparatus includes one or more management servers comprising a registry of manageable objects. The one or more management servers are capable of being executed on a first machine. One or more management applications are coupled to the one or more management servers. The one or more management applications are capable of being executed on a second machine, where the first and second machines are separate. A first cache connector is coupled to the one or more management servers, where the first cache connector retrieves and stores at least one of the manageable objects listed in the registry. A second cache connector is coupled to the one or more management applications, where the first and second cache connectors form a cache management connection. The processing required to implement the first cache connector is distributed across the first machine.
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
A system receives a management configuration set defining at least one event to be detected in the application server, and a respective associated action to be taken upon detection of the events. For each of the events to be detected in the application server, the system instantiates an event class to detect the event. For each of the actions to be taken upon detection of the event by the event class, the system instantiates a respective action class to perform that action on behalf of the event class that detects the event. The system operates the instantiated event classes to detect events and to send an event notification to each of the respective action class associated with that event.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
G06F 15/177 - Initialisation or configuration control
G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
G06F 3/00 - Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
94.
Method and apparatus for balancing thermal variations across a set of computer systems
A system that balances thermal variations within a set of computer systems in a datacenter. During operation, the system obtains a thermal flux map for the set of computer systems. The system then analyzes the thermal flux map to determine whether imbalances exist in the thermal flux across the set of computer systems. If so, the system can adjust: (1) the scheduling of loads across the set of computer systems, and/or (2) air conditioning within the datacenter, so that the thermal flux is more balanced across the set of computer systems.
H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating
G05B 13/00 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion
95.
Using computational phases to model the load on a computer system
Embodiments of the present invention provide a system that simulates a load on a computer system. The system starts by collecting a set of sampled values from one or more monitors in the computer system during the execution of program code. Next, the system uses the set of sampled values to determine if one or more repeating computational phases occurs during the execution of the program code. If one or more repeating computational phases occurs, the system subsequently simulates a load on the computer system by executing portions of the program code that caused each repeating computational phase one or more times.
A method of reproducing runtime environment for debugging an application is disclosed. The method includes accessing an optimizer file from a non-volatile storage medium. The optimizer file includes a runtime environment, application definition information, and a log. The log includes summaries of a plurality of events, the plurality of actions, and a time mark of occurrence for each of the plurality of actions. A runtime environment for debugging the application is then defined and the application runtime is set up using the application definition information in the optimizer file. Further, the method includes running the application and attaching an optimizer, then triggering each of the plurality of actions to occur at each time mark of occurrence associated with the each of the plurality of actions, and analyzing each of the plurality of actions and the plurality of events associated with the each of the plurality of actions, the analyzing includes comparing the events produced by running the application with the plurality of events in the optimizer file. If a fault is produced by the triggering, a debugger is invoked to analyze the fault.
A method and system for adding annotations to content of a webpage provided by a content server includes identifying a portion of the content of the webpage and applying an annotation to the identified portion of the content. The annotation is associated with the identified portion. The annotation and its association with the identified portion is saved on an annotations server and a link is generated to an annotated webpage wherein the content for webpage is received from a content server and the annotation is received from the annotations server. The link is sharable so as to enable others to view the annotation associated with the identified portion of the content.
A method for processing packets that includes receiving a packet from a network, analyzing the packet to obtain packet information used to determine to which temporary data structure to forward the packet, if a first list includes the packet information forwarding the packet to a first temporary data structure, and processing the packet from the first temporary data structure, and if the first list does not include the packet information forwarding the packet to a second temporary data structure, processing the packet, wherein processing the packet comprises: sending a first test to a source of the packet using the packet information, placing the packet information on the first list, if a successful response to the first test is received, and placing the packet information on a second list, if an unsuccessful response to the first test is received.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/06 - Communication control; Communication processing characterised by a protocol
A method for processing a probe including triggering the probe in an instrumented program, querying a global array to determine an execution control block associated with the probe, and executing the execution control block to obtain data.
A client module downloaded by web browser from a server receives authentication information to open a smart card in a card reader and to initiate a secure network connection to a first server module running on a server. The client module calls a second server module running on the server. And the client module receives a new application for the smart card. Then the client module causes the smart card to delete an old application and load the new application. Each of the operations performed by client module occurs in a single session.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 9/00 - Arrangements for secret or secure communications; Network security protocols