Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 13148. Отображено 100.
05-01-2012 дата публикации

Dynamic Discovery Algorithm

Номер: US20120005538A1
Принадлежит: AVIcode Inc

A system and method for identifying an application exception generated in response to a software application operating on a system is provided, wherein the method includes identifying an occurrence of an application exception, examining the application exception to identify characteristics of the application exception and processing the application exception, prior to the application exception being logged, responsive to the characteristics of the application exception. The processing includes determining whether application exception environment data is to be collected and if the application exception environment data is to be collected, logging the application exception environment data.

Подробнее
19-01-2012 дата публикации

Time-Based Trace Facility

Номер: US20120017123A1
Принадлежит: International Business Machines Corp

Method, system, and computer program product embodiments of a time-based trace facility for facilitating software debugging without interfering with the run-time behavior, performance or resource usage of the traced software are provided. The trace facility resides in a different address space than the target address space and uses different time-slices of CPU resources to execute the instructions in the address spaces. The trace facility uses a cross-memory mode to read the state data from the target address space in accordance with a time schedule. The trace facility writes the state data to a trace area, which may be located in either the target or trace address spaces or external storage. With this approach, the trace facility can read a large amount of state data frequently to construct the type of historical record needed to analysis run-time behavior, performance and resource usage. The trace facility may use a parameter file to configure a particular trace e.g. specify the target address space, one or more processing tasks within the target address space, a specific trace module, filters to extract specific state data, the time interval, the trace area, etc.

Подробнее
22-03-2012 дата публикации

Methods and computer program products for aggregating network application performance metrics by process pool

Номер: US20120072575A1
Принадлежит: Blue Stripe Software Inc

Provided are methods and computer program products for aggregating and reporting network application performance metrics by process pool. Methods may include mapping ones of a plurality of processes into one of at least one process pool; and aggregating, for each of the process pools, performance metrics generated for each of the plurality of processes mapped into that process pool.

Подробнее
19-04-2012 дата публикации

Image forming apparatus, log management method, and storage medium

Номер: US20120096465A1
Автор: Daisuke Kamishiro
Принадлежит: Ricoh Co Ltd

An image forming apparatus includes application programs that generate logs, an interface information storing unit configured to store interface information for the respective application programs, and a log management unit. The interface information is used to obtain the logs generated by the corresponding application programs. The log management unit is configured to receive a log acquisition request, to obtain the logs of one or more of the application programs specified in the log acquisition request based on the corresponding interface information stored in the interface information storing unit, and to output the obtained logs as a response to the log acquisition request.

Подробнее
03-05-2012 дата публикации

System and method for a scanning api

Номер: US20120110174A1
Принадлежит: LookOut Inc

Application programs for mobile communication devices are stored in a data store. The applications may be collected from any number of different sources such as through an application programming interface (API), from web crawling, from users, or combinations of these. The applications are analyzed and the analysis results reported. The applications may be “continuously” analyzed so that any changes in assessments can be reported. If an application for which an analysis is sought is not in the data store, information about a different, but related application may be provided.

Подробнее
17-05-2012 дата публикации

Displaying system performance information

Номер: US20120120078A1
Автор: Eric Hubbard
Принадлежит: Hewlett Packard Development Co LP

Methods, apparatus, and articles of manufacture to display system performance information are disclosed. An example method involves normalizing data representative of an operation performed by a system, a first performance metric of the system, and an event that occurred during the operation and during measurement of the first performance metric. A first object indicative of a duration of the operation is displayed. A second object is displayed with the first object. The second object is indicative of the first performance metric during the performance of the operation. An event marker is displayed with the first and second objects. The event marker is indicative of the event. The event is representative of an instance in which the first performance metric exceeded a first threshold or fell below a second threshold. The first and second objects and the event marker are aligned along a same timeline in a same graph.

Подробнее
31-05-2012 дата публикации

Systems and methods for reclassifying virtual machines to target virtual machines or appliances based on code analysis in a cloud environment

Номер: US20120136989A1
Принадлежит: Red Hat Inc

Embodiments relate to systems and methods for reclassifying a set of virtual machines in a cloud-based network. The systems and methods can analyze virtual machine data to determine performance metrics associated with the set of virtual machines, as well as target data to determine a set of target machines to which the set of virtual machines can be reassigned or reclassified. In embodiments, benefits of reassigning any of the set of virtual machines to any of the set of target virtual machines can be determined. Based on the benefits, the systems and methods can reassign or reclassify appropriate virtual machines to appropriate target virtual machines.

Подробнее
14-06-2012 дата публикации

Addressing system degradation by application disabling

Номер: US20120150785A1
Автор: Keshava Subramanya
Принадлежит: Microsoft Corp

In some embodiments, a routine is executed that identifies one or more applications that consume resources of the computer without a benefit that justifies such consumption, with the routine comprising evaluating at least some data from a source external to the computer, and an ability of the one or more identified applications to start on the computer absent user input requesting or authorizing use of such an application is disabled. In some embodiments, the external source of data may, for example, comprise a remote database identifying potentially undesirable applications and/or a remote software reputation service. In some embodiments, a routine is executed that identifies one or more applications that consume resources of the computer without a benefit that justifies such consumption and that also identifies one or more resources or utilities that utilize the one or more applications. An ability of the one or more identified applications to start on the computer absent user input requesting or authorizing use of such an application is disabled, and an ability of the one or more resources or utilities to attempt to utilize the one or more applications absent user input requesting or authorizing such an attempt is also disabled.

Подробнее
05-07-2012 дата публикации

Assessing System Performance Impact of Security Attacks

Номер: US20120174231A1
Автор: Alberto Avritzer
Принадлежит: Siemens Corp

A method for assessing an impact of a security attack on a system includes defining a system affecting metric for an observation period as a fraction of time the system satisfies a defined specification, defining a resource failure based model and a resource usage based model for the system, obtaining results for each of a plurality of states of the resource failure based model and the resource usage based model, solving the resource failure based model and the resource usage based model and obtaining a term fraction of time each model spends on each of the plurality of states, obtaining a state probability according to the term fraction, and obtaining a measure of the system affecting metric according to the state probability.

Подробнее
19-07-2012 дата публикации

Data processing method and system for database management system

Номер: US20120185451A1
Автор: Hee Jeong Cho
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A data processing method and system for a database management system are provided. The database management system can reduce the number of log records to be processed and increase database processing speed by selectively assigning a “no log” attribute to a data table at the time of database creation and skipping log recording for data items having the “no log” attribute at the time of database processing. The data processing method includes identifying one or more attributes assigned to a column of a data table associated with a data item changed during processing of a transaction, writing, when the one or more attributes of the column include a “log” attribute, log records for the transaction to a disk, and skipping, when the one or more attributes of the column include a “no log” attribute, log recording for the transaction.

Подробнее
02-08-2012 дата публикации

Method and apparatus for operating system event notification mechanism using file system interface

Номер: US20120198479A1
Принадлежит: International Business Machines Corp

A method and structure for OS event notification, including a central processing unit (CPU) and a memory including instructions for an event notification mechanism for monitoring operating system events in an operating system (OS) being executed by the CPU. The OS includes a kernel having a plurality of kernel subcomponents that provide services to one or more applications executing in the OS in a user mode, using system calls to the kernel. The OS event notification mechanism is capable of monitoring events within the kernel, at a level below the user mode level. The OS event notification mechanism includes Application Program Interfaces (APIs) that are standard for the OS.

Подробнее
09-08-2012 дата публикации

Program generating apparatus and program generating method

Номер: US20120204182A1
Автор: Masahiro Doteguchi
Принадлежит: Fujitsu Ltd

A program generating apparatus includes a second program generating unit to generate a second program including a memory image that reproduces data used to execute a subsection by a first arithmetic unit, subsection information including initial value information at the start position of the subsection, a program controlling portion to store the memory image in a second storing unit used by a second arithmetic unit, to set the second arithmetic unit to the same state as the first arithmetic unit at the start position of the subsection, and to cause the second arithmetic unit to execute the subsection of a first program, a monitor program including a function needed to execute the first program, and a monitor program initializing portion to make settings for causing the monitor program to provide a service requested when the second arithmetic unit executes the first program.

Подробнее
30-08-2012 дата публикации

Performance logging framework

Номер: US20120221293A1
Принадлежит: Apple Inc

Techniques for logging performance data are described herein. According to one embodiment, in response to a request for logging performance data, where the request includes a data type indicating a type of performance data and an actual performance data value, a non-linear mathematical operation is performed on the performance data value to generate an index value. The performance data represents a performance measurement of a predetermined operation performed by a data processing system. Thereafter, a value of a data field in a performance data store that stores the performance data is updated based on the type of the performance data and the index value. The value of the data field is updated without having to lock the data field for purpose of simultaneously accesses.

Подробнее
30-08-2012 дата публикации

Terminal data logger

Номер: US20120221949A1
Автор: Anton Arapov, Jiri Olsa
Принадлежит: Red Hat Inc

A method and system for server-side capturing, logging, and replaying terminal data of a terminal is described.

Подробнее
06-09-2012 дата публикации

Promotion of performance parameters in distributed data processing environment

Номер: US20120226478A1
Принадлежит: International Business Machines Corp

A method of performance monitoring in a data processing environment is provided. The data processing environment includes multiple systems, each of which has resources. Each resource relates to a resource type, wherein at least one performance parameter is defined for each resource type. The method includes determining a value of the at least one performance parameter for at least one resource, aggregating performance parameter values and related resources of a resource type, creating for at least a part of the resources a next predefined aggregation level which includes all resources relating to the resource type and associating all performance parameter values to this aggregation level, and repeating the creating for at least a part of the resources a next predefined aggregation level until a predefined target aggregation level of the data processing environment has been reached.

Подробнее
20-09-2012 дата публикации

Predicting performance of a consolidated virtualized computing environment

Номер: US20120239376A1
Принадлежит: SAP SE

Implementations of the present disclosure provide computer-implemented methods for predicting a performance of a consolidated virtualized computing environment. Methods include processing benchmark workloads using a plurality of virtual machines to generate a plurality of traces, each trace including data corresponding to requests issued by a respective virtual machine operating in an isolated environment, storing the plurality of traces in one or more trace repositories, each trace repository provided as a computer-readable storage medium, selecting a trace from the plurality of traces stored in the one or more trace repositories, parameterizing a queuing model based on the trace, the queuing model representing request queuing in the consolidated virtualized computing environment, and processing the queuing model using one or more processors to generate one or more response time estimates for the consolidated virtualized computing environment.

Подробнее
20-09-2012 дата публикации

Information processing apparatus with log output function, mobile terminal device, and log output control method

Номер: US20120239715A1
Автор: Atsushi Nishide
Принадлежит: Fujitsu Ltd

An information processing apparatus executing a program module under control of an operating system, the apparatus includes a log mode setting unit that sets a log mode that is an operating state for collecting information related to an operation in the information processing apparatus, a log mode control unit that, during an activation process of the operating system, loads a log output module that is a program module for outputting, as a log, information related to an access request between the operating system and a hardware resource when the access request is generated, if the log mode is set in the information processing apparatus when the operating system is activated and a log collecting unit that collects the information related to the access request as the log according to the log output module.

Подробнее
20-09-2012 дата публикации

Hardware characterization in virtual environments

Номер: US20120240109A1
Принадлежит: International Business Machines Corp

A, system, and computer program product for hardware characterization in a virtual environment are provided in the illustrative embodiments. The hardware resource is allocated to a test virtual machine (VM). A characterization workload is configured to execute in the test VM to characterize a parameter of the hardware resource. The characterization workload is caused to execute on the test VM. A first result of the characterization workload execution is received from the test VM, wherein the result assigns a value to a characteristic of the hardware resource indicative of a behavior of the hardware resource under a set of circumstances.

Подробнее
27-09-2012 дата публикации

Method and system for measuring the performance of a computer system on a per logical partition basis

Номер: US20120246439A1
Принадлежит: International Business Machines Corp

Disclosed are a method and system for measuring the performance of individual logical partitions of a logically partitioned computer system. Preferably, the method and system both hardware and firmware to allow measurement samples to be collected only for user specified zones of interest. In one embodiment, the method comprises the steps of specifying a Zone or Zones of interest (a Zone being a logical partition), collecting measurement samples only from the one or more specified Zones of interest, and measuring the performance of each of these Zones using only the measurement samples collected from said each of the Zones.

Подробнее
04-10-2012 дата публикации

Detecting irregular performing code within computer programs

Номер: US20120254841A1
Автор: Kirk J. Krauss
Принадлежит: International Business Machines Corp

A computer-implemented method of finding portions of a computer program exhibiting irregular performance can include detecting an entry into a function of a computer program under test indicating a current execution of the function and, responsive to detecting an exit from the function, determining a count of a computing resource utilized by the function during the current execution of the function. The count of the computing resource can be compared with a count range determined according to at least one prior execution of the function. The function can be selectively represented within a call graph as a plurality of nodes according to the comparing.

Подробнее
04-10-2012 дата публикации

Thread folding tool

Номер: US20120254880A1
Автор: Kirk J. Krauss
Принадлежит: International Business Machines Corp

A computer-implemented method of performing runtime analysis on and control of a multithreaded computer program. One embodiment of the present invention can include identifying threads of a computer program to be analyzed. Under control of a supervisor thread, a plurality of the identified threads can be folded together to be executed as a folded thread. The execution of the folded thread can be monitored to determine a status of the identified threads. An indicator corresponding to the determined status of the identified threads can be presented in a user interface that is presented on a display.

Подробнее
08-11-2012 дата публикации

Topology Independent Network-Based Automation Infrastructure

Номер: US20120284564A1
Принадлежит: Aruba Networks Inc

An automation process verifies that a test bed includes a set of devices specified by at least one script which are to be executed by the automation process on the test bed. The test bed is locked and the set of devices is allocated to the automation process. Performance data collection and logging for the set of devices is started and the at least one script is executed on the set of devices. After executing the at least one script, the set of devices is de-allocated and the test bed is unlocked. A notification is generated indicating that the at least one script has been executed.

Подробнее
13-12-2012 дата публикации

Apportioning summarized metrics based on unsummarized metrics in a computing system

Номер: US20120317575A1
Принадлежит: International Business Machines Corp

A computer program product includes a computer readable storage medium containing computer code that, when executed by a computer, implements a method including receiving, by a memory device of the computing system, a log file, the log file comprising unsummarized metrics, the unsummarized metrics being related to a plurality of transactions performed by a program in the computing system, and a summarized metric, the summarized metric being related to the program, wherein the summarized metric comprises accumulated data from the plurality of transactions; selecting an unsummarized metric that reflects a distribution of the summarized metric among the plurality of transactions by a processing device of the computing system; and determining an amount of the summarized metric that belongs to a transaction of the plurality of transactions based on the selected unsummarized metric by the processing device of the computing system.

Подробнее
20-12-2012 дата публикации

Performance analyzer for self-tuning system controller

Номер: US20120324097A1
Принадлежит: Hewlett Packard Development Co LP

A performance analyzer for a self-tuning system controller, and a method for performance analysis. A range of values for a control parameter of a system controller for a system is split into a plurality of sub-ranges, need is determined to obtain a data point for a sub-range of the plurality of sub-ranges based on a criteria, wherein said sub-range is adjacent to a sub-range having a best performance value that identifies a best performance for the system, the control parameter is set to a value to generate the data point for the adjacent sub-range; and the control parameter set to a value for system performance, based on a search range determined from a window of data points that includes the generated data point.

Подробнее
20-12-2012 дата публикации

Distributed trace using central performance counter memory

Номер: US20120324138A1
Принадлежит: International Business Machines Corp

A plurality of processing cores, are central storage unit having at least memory connected in a daisy chain manner, forming a daisy chain ring layout on an integrated chip. At least one of the plurality of processing cores places trace data on the daisy chain connection for transmitting the trace data to the central storage unit, and the central storage unit detects the trace data and stores the trace data in the memory co-located in with the central storage unit.

Подробнее
20-12-2012 дата публикации

Key Based Cluster Log Coalescing

Номер: US20120324290A1
Принадлежит: International Business Machines Corp

An approach is provided to trace a software program running in a multi-nodal complex computing environment. A trace request is sent from a requestor node to the nodes with the trace request associated with the software program and also associated with a transaction identifier. The software program is executed on the nodes. While the program is executing, trace data entries resulting from the execution of the software program are logged at the respective nodes with each trace data entry being associated with the transaction identifier. A log request is subsequently sent from the requestor node to the other nodes. The resulting trace data is then received by the requestor node from the target nodes and logged in a transaction based log. The transaction-based log is then provided to a user of the requestor node.

Подробнее
03-01-2013 дата публикации

System And Method For Automated Set-Top Box Testing Via Configurable Event Time Measurements

Номер: US20130002887A1
Автор: Jeremy Bruce-Smith
Принадлежит: Jeremy Bruce-Smith

The present application provides a user configurable test system for the automatic detection of events on a set-top box (STB) and the determination of their timing. The system relies upon performing metric calculations on the A/V output of the STB and measuring the duration of the event by reference to a set of user defined metrics satisfying a set of user defined conditions. The system is particularly suited to zap time measurement

Подробнее
10-01-2013 дата публикации

Health monitoring of applications in a guest partition

Номер: US20130013953A1
Принадлежит: Microsoft Corp

A health monitoring technique monitors the health and performance of applications executing in a guest partition in a virtualized environment. In an embodiment, a guest integration component interacts with an application through an application programming interface in order for the virtualization platform to monitor the health and performance of the application. In another embodiment, the guest integration component may include a monitoring agent that accesses an event log and/or a performance monitor log to access the health and performance of the application. The health and performance of the application may then be analyzed by the virtualization platform to determine an appropriate remedial action.

Подробнее
17-01-2013 дата публикации

Program Generating Apparatus, Method of Generating Program, and Medium

Номер: US20130019230A1
Принадлежит: Toshiba Corp

According to an embodiment, a program generating apparatus includes a cross-compiling unit, a processing time calculating unit, a source code converting unit, and a self-compiling unit. The cross-compiling unit generates sin instruction string for each basic block based on a source code and specifies instructions performing a memory access. The processing time calculating unit calculates a processing time of the instruction string for each basic block. The source code converting unit inserts a first code, which adds the processing time of the basic block to an accumulated processing time variable of an executed thread of the basic block, and a second code, which calculates the processing time for the specified memory access and adds the calculated processing time to the accumulated processing time variable, into the source code. The self-compiling unit generates a performance estimating program outputting the accumulated processing time variable of the thread executed.

Подробнее
24-01-2013 дата публикации

System and method for selectively consolidating applications to a machine using resource utilization data

Номер: US20130024455A1
Принадлежит: Infosys Ltd

A system and method of selectively consolidating applications on a machine comprises retrieving resource utilization data for a plurality of applications over a plurality of cycles for designated resource dimensions. A representative utilization profile is calculated on each application for each resource dimension. Load mean and variance values of the applications are calculated for each resource dimension. Each application is assigned to a class based the mean and variance values. A consolidation algorithm is computed on each application for each resource dimension to determine if resource consumption of the consolidated applications potentially exceed an available capacity in a machine.

Подробнее
28-02-2013 дата публикации

Methods and apparatus to monitor computing resources

Номер: US20130050246A1
Принадлежит: Hewlett Packard Development Co LP

Methods and apparatus to monitor computing resources are disclosed. An example method to monitor computing resources includes a determination of a first color indicative of a usage of a first computing resource managed by a first virtual machine and a determination of a second color indicative of a usage of a second computing resource managed by the first virtual machine. The example method also includes the first color and the second color being combined to determine a third color and the third color being displayed to indicate an allocation of computing resources managed by the first virtual machine.

Подробнее
28-02-2013 дата публикации

Efficient data profiling to optimize system performance

Номер: US20130054494A1
Принадлежит: International Business Machines Corp

Systems and methods for data profiling are provided. In one embodiment, the method comprises monitoring value of at least a target parameter during execution of logic code in a computing environment, wherein the value of the target parameter is incrementally updated in a sequence of data points; and using statistical analysis to determine a target value for the target parameter as of a current data point, in response to determining a change in the value of the target parameter at each data point.

Подробнее
07-03-2013 дата публикации

Process Management Views

Номер: US20130061167A1
Принадлежит: Microsoft Corp

Two different process management views can be displayed, and a user can request to switch between the two views. The user can select a process in either view and have the selected process terminated. One view is a simplified view that identifies processes and whether they are non-responsive. The other view is an expanded view that identifies processes and the amount of various system resources used by each of those processes. Various additional information can be displayed in the expanded view, such as identifiers of various windows, tabs, and/or services associated with each of the processes.

Подробнее
14-03-2013 дата публикации

Promotion of performance parameters in distributed data processing environment

Номер: US20130067077A1
Принадлежит: International Business Machines Corp

A method of performance monitoring in a data processing environment is provided. The data processing environment includes multiple systems, each of which has resources. Each resource relates to a resource type, wherein at least one performance parameter is defined for each resource type. The method includes determining a value of the at least one performance parameter for at least one resource, aggregating performance parameter values and related resources of a resource type, creating for at least a part of the resources a next predefined aggregation level which includes all resources relating to the resource type and associating all performance parameter values to this aggregation level, and repeating the creating for at least a part of the resources a next predefined aggregation level until a predefined target aggregation level of the data processing environment has been reached.

Подробнее
21-03-2013 дата публикации

Tracking and analysis of usage of a software product

Номер: US20130074051A1
Автор: Clinton Freeman
Принадлежит: National ICT Australia Ltd

A method for tracking and analysing usage of a software product, comprising: (a) collecting data relating to usage of instances of the software product from multiple user devices, wherein the user devices each execute an instance of the software product instrumented to capture the data, and the collected data includes data relating to (i) features of the software product invoked on the user devices, and one or more of: (ii) any errors occurred during the use of the software product and (iii) user feedback indicating satisfaction or dissatisfaction on the software product regardless of whether an error has occurred; and (b) analysing the collected data to determine at least one sequence of the features that is likely to lead to an error and/or a sequence of the features that is likely to lead to user satisfaction or dissatisfaction of the software product for facilitating enhancement of the software product.

Подробнее
28-03-2013 дата публикации

Immediate delay tracker tool

Номер: US20130081001A1
Принадлежит: Microsoft Corp

An immediate delay tracker tool listens for the occurrence of user-specified events that exceed a delay threshold. In an embodiment, the events are associated with immediate user actions processed by a user interface (UI) thread where the response time of the immediate user action requires an instantaneous response. When the event exceeds the delay threshold, the control flow of all the processes and/or threads in the system is recorded, filtered and then analyzed for the source of the delay.

Подробнее
11-04-2013 дата публикации

User-coordinated resource recovery

Номер: US20130091391A1
Принадлежит: International Business Machines Corp

A computing system includes a processor configured to identify a resource manager associated with a computing transaction, classify the computing transaction to determine a predetermined metric, measure an actual metric of the computing transaction, compare the predetermined metric to the actual metric to detect abnormal behavior in the transaction and model the abnormal behavior to determine how the resource manager is affected by the abnormal behavior.

Подробнее
18-04-2013 дата публикации

SYSTEM TEST METHOD

Номер: US20130096880A1
Принадлежит:

Disclosed is a test system and method that is configured to identify a position of a process control block, access the position of the process control block, and monitor performance factors related to the process control block. 1. A method for testing performance of a system , comprising:identifying, by a processor, a position of a process control block;accessing, by the processor, the position of the process control block; andmonitoring, by the processor, performance factors related to the process control block.2. The method of claim 1 , wherein the process control block is placed in kernel memory.3. The method of claim 2 , wherein the accessing-the-position-of-the-process-control-block comprises accessing the kernel memory using a virtual driver.4. The method of claim 1 , wherein the monitoring-performance-factors-of-the-process-control-block comprises measuring the performance factors of the process control block at a predetermined time interval.5. The method of claim 2 , wherein the monitoring-performance-factors-of-the-process-control-block comprises measuring the performance factors for a process and thread of the process control block.6. The method of claim 5 , wherein the performance factors of the process control block comprise one or more of a processor usage claim 5 , a memory usage claim 5 , and a page fault.7. The method of claim 6 , wherein the performance factors of the process of the process control block comprise one or more of an identifier (ID) claim 6 , a state of the process claim 6 , a priority of the process claim 6 , a heap usage claim 6 , an operating time of the process claim 6 , a use time claim 6 , and a kernel time.8. The system test method of claim 6 , wherein the performance factors of the thread of the process control block comprise one or more of an ID claim 6 , a run state claim 6 , a basic priority claim 6 , a current priority claim 6 , a use time claim 6 , a kernel time claim 6 , and a call-stack.9. The system test method of claim ...

Подробнее
18-04-2013 дата публикации

SYSTEMS AND METHODS FOR MONITORING VOICE SERVICE FEATURE FAILURES IN A TELECOMMUNICATION NETWORK

Номер: US20130097465A1
Принадлежит: AT&T Corp.

A method includes receiving multiple alarm messages, each being associated with a failure associated with a service feature available within a telecommunication network. A failure rate for a type of failure having a common set of service feature failure characteristics is determined from the alarm messages received. When the failure rate exceeds a threshold, a maintenance ticket is generated automatically. 1. A method , comprising:receiving, by a processor, a plurality of alarm messages, each alarm message from the plurality of alarm messages being associated with a failure from a plurality of failures, each failure from the plurality of failures being associated with a service feature available within a telecommunication network between an endpoint and a server providing the service feature;determining, from the plurality of alarm messages by the processor, a failure rate for a type of failure having a common set of service feature failure characteristics; andgenerating, by the processor, a maintenance ticket when the failure rate exceeds a threshold.2. The method of claim 1 , wherein the telecommunication network comprises a voice over internet protocol network.3. The method of claim 1 , wherein the set of service feature failure characteristics includes a failure mechanism.4. The method of claim 1 , wherein the failure rate is a number of service feature failures associated with the set of service feature characteristics over a predetermined time period.5. The method of claim 1 , wherein the service feature includes a locate me feature.6. The method of claim 1 , further comprising:transmitting the maintenance ticket to a targeted recipient.7. The method of claim 1 , further comprising:assigning a priority setting associated with the type of failure; andtransmitting the maintenance ticket to a work management system.8. The method of claim 1 , further comprising:determining using a rules-based algorithm a procedure to address the type of failure;including the ...

Подробнее
23-05-2013 дата публикации

ISOLATION OF PROBLEMS IN A VIRTUAL ENVIRONMENT

Номер: US20130132778A1
Автор: Dagan Assaf
Принадлежит:

Problem isolation in a virtual environment is described. In one example, a method () is provided for isolating problems in a virtual environment. The method includes maintaining () a topology of network devices in the virtual environment. The virtual environment can be monitored () using a performance module for network device operation irregularities exceeding a threshold. A network device operation irregularity can be identified () as well as a portion of the topology associated with the network device operation irregularity. Topology portions associated with network device operation irregularities can be grouped () together using a snapshot module to form a snapshot of a problem topology. 1300. A method () for isolating problems in a virtual environment , comprising:{'b': '310', 'maintaining () a topology of network devices in the virtual environment;'}{'b': '320', 'monitoring () the virtual environment for network device operation irregularities exceeding a threshold, wherein monitoring is performed by a performance module on a problem isolation server;'}{'b': '330', 'identifying () a network device operation irregularity using a breach detection module;'}{'b': '340', 'identifying () a portion of the topology associated with the network device operation irregularity using a processor; and'}{'b': '350', 'grouping () topology portions associated with network device operation irregularities together using a snapshot module to form a snapshot of a problem topology.'}2. A method as in claim 1 , further comprising creating a graph representing the snapshot claim 1 , wherein the graph shows a relationship between the topology portions grouped together.3. A method as in claim 2 , wherein the relationship comprises a causal relationship.4. A method as in claim 2 , wherein the relationship comprises a chronological relationship.5. A method as in claim 1 , wherein grouping topology portions further comprises grouping topology portions associated with network device ...

Подробнее
06-06-2013 дата публикации

Floating-point event counters with automatic prescaling

Номер: US20130142301A1
Принадлежит: International Business Machines Corp

Occurrences of a particular event in an electronic device are counted by incrementing an event counter each time a variable number of the particular events have occurred, and automatically increasing that variable number as the total count increases. The variable number (prescale value) can increase geometrically according to a programmable counter base each time the count mantissa overflows. The event counter thereby provides hardware-implemented automatic prescaling while significantly reducing the number of interface bits required to support very large count ranges, and retaining high accuracy at very large event counts.

Подробнее
20-06-2013 дата публикации

Automatic Configuration Sampling for Managing Configuration Parameters of a Computer System

Номер: US20130159693A1
Принадлежит: International Business Machines Corp

A computer configuration utility automatically alters system configuration parameters to sample multiple different configurations. At least one workrate metric is measured at each sampled configuration. The workrate measurements for the multiple different configurations are compared to determine the effect of different configurations with respect to at least one optimization criterion. System configuration is automatically adjusted to the optimum configuration. Preferably, the workrate metric is (non-idle) instructions executed per unit of time.

Подробнее
20-06-2013 дата публикации

Open kernel trace aggregation

Номер: US20130159977A1
Принадлежит: Microsoft Corp

A kernel trace system is described that acts as a kernel driver to insert traces into an open system kernel using existing kernel probe application-programming interfaces (APIs) and copies these events to an existing logging module for transfer to user space. The new module aggregates kernel traces to a performance logging module. A performance logging module can be extended with the kernel trace system herein to include new events in an open kernel not originally included in the implementation of the performance logging module. In this way, the kernel trace system can cause events to be logged that were not logged in the kernel as provided by the operating system vendor, and can do so without requiring that a new version of the operating system be built. The probes can be inserted dynamically at run time on an existing kernel to extract additional trace information.

Подробнее
27-06-2013 дата публикации

Methods for assessing data center efficiency and devices thereof

Номер: US20130166250A1
Принадлежит: Infosys Ltd

A method, non-transitory computer readable medium, and apparatus for assessing efficiency of a data center includes querying, based on a system management protocol, each of a plurality of information technology (IT) devices to obtain utilization information. A power rating value is obtained for each of the plurality of IT devices. An IT power consumption value for the plurality of IT devices is generated based on the utilization information for the plurality of IT devices and the power rating values. A value for at least one efficiency metric is generated and output based on the IT power consumption value.

Подробнее
04-07-2013 дата публикации

METHOD AND APPARATUS FOR MEASURING PERFORMANCE OF AN APPLIANCE

Номер: US20130173219A1

A computer program product and apparatus measure performance of an information appliance. The computer program product comprises code for: a test module receiving, from a client, and recording a request for processing of a sample data by an information appliance. The test module sends the sample data received from the client to the information appliance for processing. If a request to a backend application is present, the test module also sends the request to the backend application for processing and receives and records a response from the backend application. The test module sends the response from the backend application to the information appliance for processing. A generated correlation ID is used to update a performance data table with start time and a stop time of a response for transaction sample data processed by the information appliance. 14-. (canceled)5. A computer-readable storage device having a plurality of instructions embodied therein , wherein the plurality of instructions , when executed by a processing device , enables a machine to:receive and record a request from a client for processing of a sample data by an information appliance;send the request for sample data to the information appliance for processing;determine whether a request to a backend application for processing is present; and send the request to the backend application for processing;', 'receive and record a response from the backend application; and', 'send the response from the backend application to the information appliance for processing., 'in response to determining a request to the backend application is present6. The computer-readable storage device of claim 5 , wherein the response of the backend application and the sample data are stored in a traffic data table (TDT) as a transaction sample data.7. The computer-readable storage device of claim 6 , the plurality of instructions further comprising instructions that enable the machine to:generate a correlation ID and update ...

Подробнее
25-07-2013 дата публикации

MONITORING DATA ANALYZING APPARATUS, MONITORING DATA ANALYZING METHOD, AND MONITORING DATA ANALYZING PROGRAM

Номер: US20130191107A1
Автор: Tonouchi Toshio
Принадлежит: NEC Corporation

An object of the present invention is to improve prediction accuracy for a performance value of a monitoring target system even if the performance value is substantially different for each of patterns of use. A monitoring data analyzing apparatus includes a regression-model recalculating section 14 configured to combine regression models, which are generated for each of a plurality of groups into which log data including monitoring data in a monitoring target system set as a target of performance management is classified, using the log data belonging to the groups corresponding to the regression models and test target log data, which is the log data set as a target of a performance test, to recalculate the regression models. 1. A monitoring data analyzing apparatus comprising:a regression-model recalculating section configured to combine regression models, which are generated for each of a plurality of groups into which log data including monitoring data in a monitoring target system set as a target of performance management is classified, using the log data belonging to the groups corresponding to the regression models and test target log data, which is the log data set as a target of a performance test, to recalculate the regression models.2. The monitoring data analyzing apparatus according to claim 1 , further comprising:a data accumulating section configured to accumulate the log data;a data classifying section configured to classify the log data into the groups on the basis of characteristics of use status data included in the log data and indicating statuses of use of components of the monitoring target system; anda regression-model generating section configured to execute a regression analysis of the log data and generate a regression model for each of the groups.3. The monitoring data analyzing apparatus according to claim 1 , further comprising a characteristic-data-item extracting section configured to extract claim 1 , out of data items included in the ...

Подробнее
08-08-2013 дата публикации

STORAGE DEVICE, AND STORAGE DEVICE CONTROL METHOD

Номер: US20130205173A1
Автор: YONEDA Yusuke
Принадлежит:

A storage device, which performs input/output processing on a memory device through a relay apparatus, includes a memory and a processor coupled to the memory. The processor executes a process including: determining whether or not a cumulative value accumulated according to occurrence of error in the memory device during the input/output processing reaches a predetermined threshold value; comparing when the determined cumulative value is greater than or equal to the threshold value, number of input/output processing on the memory device with number of input/output processing on another memory device mounted on the relay apparatus, and determining whether or not there is a bias; determining when the bias is determined, whether or not a connection status is normal with respect to the relay apparatus; and detaching when it is determined that the connection status of the relay apparatus is normal, the connection to the memory device. 1. A storage device , which performs input/output processing on a memory device through a a memory; and', 'a processor coupled to the memory, wherein the processor executes a process comprising:', 'determining whether or not a cumulative value accumulated according to occurrence of error in the memory device during the input/output processing reaches a predetermined threshold value;', 'comparing when the determined cumulative value is greater than or equal to the threshold value, number of input/output processing on the memory device with number of input/output processing on another memory device mounted on the relay apparatus, and determining whether or not there is a bias;', 'determining when the bias is determined, whether or not a connection status is normal with respect to the relay apparatus; and', 'detaching when it is determined that the connection status of the relay apparatus is normal, the connection to the memory device., 'relay apparatus, the storage device comprising2. The storage device according to claim 1 , wherein the ...

Подробнее
22-08-2013 дата публикации

FAULT MONITORING DEVICE, FAULT MONITORING METHOD, AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM

Номер: US20130219229A1
Автор: Sugimoto Mitsuo
Принадлежит: FUJITSU LIMITED

A fault monitoring device includes: a receiving unit that receives designation information which designates a plurality of monitored objects, an acquisition beginning condition of log data from the monitored objects, and a time interval for acquiring the log data; an acquiring unit that, when the acquisition beginning condition of log data is met, acquires the log data from the monitored objects according to the time interval; and an output unit that outputs the acquired log data in the form of a list according to time order. 1. A fault monitoring device comprising:a receiving unit that receives designation information which designates a plurality of monitored objects, an acquisition beginning condition of log data from the monitored objects, and a time interval for acquiring the log data;an acquiring unit that, when the acquisition beginning condition of log data is met, acquires the log data from the monitored objects according to the time interval; andan output unit that outputs the acquired log data in the form of a list according to time order.2. The fault monitoring device as claimed in claim 1 , wherein the monitored objects are a plurality of error status registers included in any one of a plurality of processors claim 1 , a plurality of chipsets claim 1 , or a combination of a processor and a chipset claim 1 , and the log data is values of the error status registers.3. The fault monitoring device as claimed in claim 1 , wherein the designation information includes an acquisition stopping condition of the log data claim 1 , and when the acquisition stopping condition of the log data is met claim 1 , the acquiring unit stops acquiring the log data from the monitored objects.4. The fault monitoring device as claimed in claim 1 , wherein when the receiving unit has received an acquisition stopping command of the log data from an external device claim 1 , the acquiring unit stops acquiring the log data from the monitored objects.5. A fault monitoring method ...

Подробнее
22-08-2013 дата публикации

PROFILING AND SEQUENCING OPERATORS EXECUTABLE IN AN EMULATED COMPUTING SYSTEM

Номер: US20130219370A1
Принадлежит:

Methods and systems are disclosed for analyzing performance of a translated code stream executing within a central processing module. One method includes, during execution of one or more native instructions corresponding to each non-native operator in the code stream by the code execution unit, counting the occurrence of the non-native operator, determining a duration of execution of the one or more native instructions, and adding the non-native operator to a trace sequence. The method also includes, after execution of the code stream within the central processing module, generating a data file of non-native operators executed within the code stream, the data file of operators including a name of each non-native operator, an elapsed amount of time within the code execution unit that the one or more native operators corresponding to the non-native operator are executed, and a number of occurrences of the non-native operator within the code stream. 1. A method of analyzing performance of a translated code stream executing within a central processing module , the translated code stream corresponding to a translation of a plurality of non-native operators , the central processing module executing on a computing system , the method comprising: counting the occurrence of the non-native operator;', 'determining a duration of execution of the one or more native instructions; and', 'adding the non-native operator to a trace sequence;, 'during execution of one or more native instructions corresponding to each non-native operator in the code stream by the code execution unitafter execution of the code stream within the central processing module, generating a data file of non-native operators executed within the code stream, the data file of operators including a name of each non-native operator, an elapsed amount of time within the code execution unit that the one or more native operators corresponding to the non-native operator are executed, and a number of occurrences of the ...

Подробнее
22-08-2013 дата публикации

Optimization of an application to reduce local memory usage

Номер: US20130219379A1
Принадлежит: International Business Machines Corp

A method of optimizing an application to reduce local memory usage. The method can include instrumenting at least one executable class file of the application with analysis code, the executable class file including bytecode. The method also can include executing the class file on a virtual machine, wherein during execution the analysis code generates data related to the application's use of local memory. The method further can include, via a processor, analyzing the data related to the application's use of the local memory to generate a memory profile analysis. The method further can include, based on the memory profile analysis, automatically revising at least one portion of the bytecode to reduce an amount of the local memory used by the application.

Подробнее
29-08-2013 дата публикации

Determining Sustainability Of A Data Center

Номер: US20130226525A1

Determining a sustainability impact for available data center architectures. A data center is accessed by a computer. Two or more functional parameters of the data center are then evaluated by the computer. Then, the computer combines the two or more evaluated functional parameters into a quantified judgment to determine a sustainability impact of available architectures of the data center. 1. A computer-implemented method for determining a sustainability impact for available data center architectures , said computer-implemented method comprising:accessing by a computer a data center;evaluating by said computer functional parameters of said data center; andcombining by said computer said functional parameters to generate a quantified judgment, said quantified judgment comprising a sustainability impact determination of available architectures of said data center.2. The computer-implemented method of claim 1 , further comprising:adjusting by said computer said data center based upon said quantified judgment.3. The computer-implemented method of claim 1 , wherein said accessing by a computer a data center comprises:accessing said data center at time of design of said data center.4. The computer-implemented method of claim 1 , wherein said accessing by a computer a data center comprises:accessing said data center at time of operation of said data center.5. The computer-implemented method of claim 1 , wherein said accessing by a computer a data center comprises:accessing said data center at an end-of-life of said data center.6. The computer-implemented method of claim 1 , wherein said evaluating by said computer functional parameters of said data center comprises:determining architecture availability for said data center; anddetermining sustainability for said architecture availability.7. The computer-implemented method of claim 2 , wherein said adjusting by said computer said data center based on said quantified judgment comprises:adjusting said data center according ...

Подробнее
19-09-2013 дата публикации

Configuration information management apparatus and retrieval method

Номер: US20130246391A1
Принадлежит: Fujitsu Ltd

A configuration information management apparatus includes a control unit which, generates a retrieval formula pattern representing a pattern of a first relationship retrieval formula which has been input, executes retrieval processing on the retrieval formula pattern, measures a state required for the retrieval processing which has been executed, determines whether or not the state satisfies a first condition, and when the first condition is satisfied, stores a retrieval condition relating to a retrieval subject configuration item in the retrieval formula pattern satisfying the first condition in a database as a short retrieval key, and retrieves, when a second relationship retrieval formula is input and a retrieval formula pattern of the second relationship retrieval formula satisfies a second condition, the retrieval subject configuration item in the second relationship retrieval formula, on the basis of the short retrieval key.

Подробнее
19-09-2013 дата публикации

Run-time-instrumentation controls emit instruction

Номер: US20130246747A1
Принадлежит: International Business Machines Corp

Embodiments of the invention relate to executing a run-time-instrumentation EMIT (RIEMIT) instruction. A processor is configured to capture the run-time-instrumentation information of a stream of instructions. The RIEMIT instruction is fetched and executed. It is determined if the current run-time-instrumentation controls are configured to permit capturing and storing of run-time-instrumentation information in a run-time-instrumentation program buffer. If the controls are configured to store run-time-instrumentation instructions, then a RIEMIT instruction specified value is stored as an emit record of a reporting group in the run-time-instrumentation program buffer.

Подробнее
19-09-2013 дата публикации

INTEGRATED CIRCUIT AND METHOD FOR MONITORING BUS STATUS IN INTEGRATED CIRCUIT

Номер: US20130246859A1
Принадлежит: Huawei Technologies Co., Ltd.

Embodiments of the present invention disclose an integrated circuit and a method for monitoring a bus status in the integrated circuit. Multiple status detectors and a top layer monitor are disposed in the integrated circuit. Each status detector in the multiple status detectors is used to read status data on a branch bus that is coupled to each status detector in the multiple status detectors, and then the top layer monitor collects the status data from each status detector, and outputs the status data through an interface. 1. An integrated circuit , comprising:a processor, a host bus, multiple branch buses, multiple status detectors, a top layer monitor, and an interface; whereinthe multiple branch buses are coupled to the processor through the host bus;the host bus is configured to transmit data from the multiple branch buses to the processor;the processor is configured to perform data processing;each status detector in the multiple status detectors is coupled to a branch bus in the multiple branch buses respectively, and is configured to read status data on the branch bus that is coupled to each status detector, and upload the status data to the top layer monitor; andthe top layer monitor is configured to collect the status data from each status detector, and output the status data through the interface.2. The integrated circuit according to claim 1 , wherein the top layer monitor comprises at least one buffer claim 1 , configured to buffer the status data from each status detector.3. The integrated circuit according to claim 2 , wherein the top layer monitor comprises: a processing unit claim 2 , configured to separately pack the status data from each status detector to obtain packed status data from each status detector claim 2 , and output the packed status data from each status detector through the interface claim 2 , wherein the packed status data from each status detector comprises an identifier that corresponds to each status detector claim 2 , ...

Подробнее
03-10-2013 дата публикации

ASSESSING COMPUTER PROGRAMS USING STACK FRAME SIGNATURES

Номер: US20130262936A1
Принадлежит: CBS Interactive, Inc.

A method of assessing a computer program under actual working conditions according to one embodiment comprises executing the computer program multiple times under actual working conditions, in response to each unhandled exception encountered during execution of the computer program, creating a corresponding stack frame signature to characterize the state of the program, and comparing the stack frame signatures to determine which unhandled exceptions are likely to have resulted from similar features. 1. A computer-implemented method , comprising:tracing by a processor a call stack for an executed program;generating a selected metric for each stack frame in the call stack, the selected metric comprising a type of module corresponding to the stack frame;encoding each selected metric into a corresponding symbol; andassembling the encoded symbols into an ordered list to form a stack frame signature with a historical execution path of the executed program,wherein the type of module is used to determine whether to include the selected metric in the stack frame signature.2. A computer-implemented method according to claim 1 , comprising:excluding a selected metric from the stack frame signature that is associated with a type of module provided by an operating system.3. A computer-implemented method according to claim 1 , wherein the selected metric comprises a length of each of the stack frames.4. A computer-implemented method according to claim 3 , wherein the step of encoding each selected metric into a corresponding symbol comprises encoding the length of each of the stack frames in a positional notation system of the form base b claim 3 , wherein b is greater than 2.5. A computer-implemented method according to claim 1 , wherein the selected metric comprises an identifier of a generic type of callee module corresponding to each of the stack frames.6. A computer-implemented method according to claim 1 , wherein the selected metric comprises an identifier of a specific ...

Подробнее
03-10-2013 дата публикации

Optional logging of debug activities in a real time instruction tracing log

Номер: US20130263093A1
Принадлежит: Intel Corp

In accordance with embodiments disclosed herein, there are provided methods, systems, mechanisms, techniques, and apparatuses for implementing optional logging of debug activities in a real time instruction tracing log. For example, in one embodiment, such means may include an integrated circuit having means for initiating instruction tracing for instructions of a traced application, mode, or code region, as the instructions are executed by the integrated circuit; means for generating a plurality of packets to a debug log describing the instruction tracing; means for initiating an alternative mode of execution within the integrated circuit; and means for suppressing indication of entering the alternative mode of execution. Additional and alternative means may be implemented for selectively causing an integrated circuit to operate in accordance with an invisible trace mode or a visible trace mode upon transition to the alternative mode of execution.

Подробнее
17-10-2013 дата публикации

Adaptive system monitoring

Номер: US20130275814A1
Принадлежит: Individual

Various embodiments of systems and methods for monitoring a system are described herein. A request is received from a user to generate a system watch for monitoring a system. The request may include a primary system monitoring parameter to be included in the system watch. One or more system monitoring parameters correlated to the primary system watch are identified from a system monitoring parameter database. The system watch is generated based on the primary system monitoring parameter and at least one secondary system monitoring parameter from the identified one or more system monitoring parameters. In one aspect, the system monitoring parameter database is built based on system watch related input received for a plurality of system watches.

Подробнее
24-10-2013 дата публикации

Cost Analysis for Selecting Trace Objectives

Номер: US20130283246A1
Автор: Krajec Russell S., LI Ying
Принадлежит: CONCURIX CORPORATION

A tracing system may perform cost analysis to identify burdensome or costly trace objectives. For a burdensome objective, two or more objectives may be created that can be executed independently. The cost analysis may include processing, storage, and network performance factors, which may be budgeted to collect data without undue performance or financial drains on the application under test. A larger objective may be recursively analyzed to break the larger objective into smaller objectives which may be independently deployed. 1. A method performed by a computer processor , said method comprising:receiving an application to instrument;identifying a first trace objective for said application, said first trace objective comprising a plurality of data items to collect;determining that said first trace objective exceeds a cost threshold;creating a second trace objective comprising a first subset of said plurality of data items and a third trace objective comprising a second subset of said plurality of data items;determining that said second trace objective and said third trace objective are within said cost threshold;causing said second trace objective and said third trace objective to be executed; andcollecting said first subset of said data items when said second trace objective is executed and collecting said second subset of said data items when said third trace objective is executed.2. The method of further comprising:for said first trace objective, determining a plurality of tracing components, each of said tracing components comprising a collection of a discrete data item;determining a cost for each of said tracing components; andsummarizing said cost for each of said tracing components to determine an execution cost.3. The method of claim 2 , said cost comprising performance costs.4. The method of claim 3 , said performance costs comprising processor costs.5. The method of claim 3 , said performance costs comprising network bandwidth costs.6. The method of claim ...

Подробнее
24-10-2013 дата публикации

Optimization Analysis Using Similar Frequencies

Номер: US20130283247A1
Автор: Krajec Russell S., LI Ying
Принадлежит: CONCURIX CORPORATION

Tracer objectives in a distributed tracing system may be compared to identify input parameters that may have a high statistical relevancy. An iterative process may traverse multiple input objects by comparing results of multiple tracer objectives and scoring possible input objects as being possibly statistically relevant. With each iteration, statistically irrelevant input objects may be discarded from a tracer objective and other potentially relevant objects may be added. The iterative process may converge on a set of statistically relevant input objects for a given measured value without a priori knowledge of an application being traced. 1. A method performed by a computer processor , said method comprising:receiving an application to instrument;identifying a plurality of trace objectives for said application, said trace objectives comprising trace objects and input parameters;causing said plurality of trace objectives to be executed with said application to generate a plurality of results sets;selecting a first results set generated from a first tracer objective;analyzing said first results set to identify a first frequency;identifying a second trace objective having a second results set comprising said first frequency;identifying a second input parameter in said second trace objective;creating a third trace objective comprising said first trace object and said second input parameter; andcausing said third trace objective to be executed.2. The method of further comprising:analyzing said first results set to create a first frequency signature, said first frequency signature comprising said first frequency.3. The method of further comprising:searching said plurality of trace objectives to identify said second trace objective having a second frequency signature matching said first frequency signature.4. The method of claim 3 , said first frequency signature and said second frequency signature being matched using a similarity analysis.5. The method of further ...

Подробнее
14-11-2013 дата публикации

System and method for predicting and avoiding network downtime

Номер: US20130305100A1
Автор: Beasley Peter
Принадлежит:

This invention teaches how to use prediction software and algorithms to minimize the risk of failure, and to increase the likelihood of success of information technology (IT) and telecommunications system changes. The method identifies the systems, people, documents and other unanticipated consequences of system changes. The invention teaches how use of the prediction software and algorithms allow system administrators to find more advantageous ways and times to perform system changes. 1. A method stored in memory for storing data for computing a predicted risk of failure or predicted likelihood of success of a planned information technology (IT) or telecommunications system change and identifying the consequences of the change.2. A method of wherein the consequences of the change include the people that can be affected by the change.3. A method of wherein the consequences of the change include the systems that can be affected by the change.4. A method of wherein the consequences of the change include the documents that can be affected by the change.5. A method of wherein the consequences of the change include consequences unanticipated without using prediction software and algorithms.6. A method stored in memory for predicting the anticipated consequence of a planned information technology (IT) or telecommunications system change and avoiding the risk of failure and increasing the likelihood of success of that change.7. A method of wherein the computation for predicting the anticipated consequence of a planned change includes data on the impact of past changes.8. A method of wherein the risk of failure is avoided and the likelihood of success of the change are increased by computing the risk and success profile for another day claim 6 , for a different time claim 6 , by eliminating changes to be completed at the same time claim 6 , or performing the change by a different person.9. A method of wherein the risk of failure is avoided and the likelihood of success of ...

Подробнее
14-11-2013 дата публикации

Techniques for Autonomic Reverting to Behavioral Checkpoints

Номер: US20130305101A1
Принадлежит: QUALCOMM INCORPORATED

Aspect methods, systems and devices may be configured to create/capture checkpoints without significantly impacting the performance, power consumption, or responsiveness of the mobile device. An observer module of the mobile device may instrument or coordinate various application programming interfaces (APIs) at various levels of the mobile device system and constantly monitor the mobile device (via a low power process, background processes, etc.) to identify the normal operation patterns of the mobile device and/or to identify behaviors that are not consistent with previously computed normal operation patterns. The mobile device may store mobile device state information in a memory as a stored checkpoint when it determines that the mobile device behaviors are consistent with normal operation patterns, and upload a previously stored checkpoint to a backup storage system when it determines that the mobile device behaviors are not consistent with normal operation patterns. 1. A method of checkpointing in a mobile device , comprising:observing mobile device behaviors over a period of time to recognize mobile device behaviors that are inconsistent with normal operation patterns;storing mobile device state information in a memory as a stored checkpoint when it is determined that the mobile device behaviors are consistent with normal operation patterns; anduploading the stored checkpoint to a backup storage system in response to determining that the mobile device behaviors are not consistent with normal operation patterns.2. The method of claim 1 , wherein storing mobile device state information in a memory as a stored checkpoint comprises storing state information for restoring the mobile device as the stored checkpoint.3. The method of claim 1 , wherein storing mobile device state information in a memory as a stored checkpoint comprises storing state information for restoring a specific software application as the stored checkpoint.4. The method of claim 1 , further ...

Подробнее
21-11-2013 дата публикации

Hardware profiling mechanism to enable page level automatic binary translation

Номер: US20130311758A1
Принадлежит: Intel Corp

A hardware profiling mechanism implemented by performance monitoring hardware enables page level automatic binary translation. The hardware during runtime identifies a code page in memory containing potentially optimizable instructions. The hardware requests allocation of a new page in memory associated with the code page, where the new page contains a collection of counters and each of the counters corresponds to one of the instructions in the code page. When the hardware detects a branch instruction having a branch target within the code page, it increments one of the counters that has the same position in the new page as the branch target in the code page. The execution of the code page is repeated and the counters are incremented when branch targets fall within the code page. The hardware then provides the counter values in the new page to a binary translator for binary translation.

Подробнее
05-12-2013 дата публикации

Optimizing the utilization of computer system's resources

Номер: US20130326529A1
Принадлежит: International Business Machines Corp

The present invention optimizes the utilization of computer system resources by considering predefined performance targets of multithreaded applications using the resources. The performance and utilization information for a set of multithreaded applications is provided. Using the performance and utilization information, the invention determines overutilized resources. Using the performance information, the invention also identifies threads and corresponding applications using an overutilized resource. The priority of the identified threads using said overutilized resource is adjusted to maximise a number of applications meeting their performance targets. The adjustments of priorities are executed via a channel that provides the performance and utilization information.

Подробнее
12-12-2013 дата публикации

METHOD FOR AUTOMATICALLY MONITORING AT LEAST ONE COMPONENT OF A PHYSICAL SYSTEM

Номер: US20130332779A1
Автор: Hainzl Stefan
Принадлежит:

A method for automatic monitoring of at least one component of a physical system, includes checking data of a data record for errors caused by a preceding data processing, checking the data in the physical context of the at least one sensor for errors resulting from infringements of the assumptions of physical and/or system-related factors in elements of the measurement chain, the context of the component for errors resulting from infringements of the physical and/or system-related factors of the component, and—checking the individually asserted errors against one another and then either rejecting the error or outputting the error as an error message with reference to the error source. 1. Method for automatic monitoring of at least one component of a physical system ,where at least one sensor of the component emits an electrical signal via a measurement chain, which signal is read and processed and then saved as data of a file in a data record,where subsequently in a first checking step the data of the data record is checked for errors that might be caused by a preceding data processing,where subsequently in a second checking step the data of the data record is placed in the physical context of the at least one sensor and checked for errors that might result from infringements of the assumptions of the physical and/or system-related factors in the elements of the measurement chain,where subsequently in a third checking step the data of the data record is placed in the context of the component and checked for errors that might result from infringements of the physical and/or system-related factors of the component, andwhere subsequently in a fourth checking step the individually asserted errors are checked against one another and are either rejected or output as an error message with reference to the error source.2. Method in accordance with claim 1 , where after the second checking step in a further checking step—in the event of a plurality of sensors claim 1 , if ...

Подробнее
19-12-2013 дата публикации

Relaying apparatus, relay history recording method, and data processing apparatus

Номер: US20130339591A1
Принадлежит: Fujitsu Ltd

When a relaying apparatus receives communication unit data transmitted from a processing apparatus that performs data processing, the relaying apparatus extracts preset data from the received communication unit data as trace information and calculates the number of pieces of the received communication unit data. History information of the received communication unit data is selected from the extracted trace information and statistical information obtained from the result of the calculation. The selected information is recorded in a storage apparatus available to the processing apparatus.

Подробнее
19-12-2013 дата публикации

Failover estimation using contradiction

Номер: US20130339800A1
Автор: Hilton Arnold Lange
Принадлежит: Microsoft Corp

A failover guaranty estimator module performs a proof by contradiction method showing that a cluster failover guaranty can be met for the cluster. For potential failures for which failover is guaranteed, the method assumes a particular host set of one or more hosts fails, leaving one or more working hosts. The method performs a per-failure host set method for the failure host set. The per-failure host set method determines an amount of memory usage within each working host of the assumed working host set that would guaranty that a largest of the virtual machines in the failure host set would be orphaned. The per-failure host set method determines if the virtual machines in the failure set, other than the largest virtual machine in that set, would force the determined amount of memory usage within working hosts, resulting in, the failover guaranty not being met.

Подробнее
02-01-2014 дата публикации

Managing traces to capture data for memory regions in a memory

Номер: US20140006874A1
Принадлежит: International Business Machines Corp

Provided are a computer program product, system, and method for managing traces to capture data for memory regions in a memory. A trace includes a monitor parameter used by a trace procedure to monitor data in a memory device. A frequency is determined at which the trace procedure monitors the memory device. The trace procedure is invoked at the determined frequency to perform trace procedure operations comprising determining a region in the memory device according to the monitor parameter and copying data in the determined region to trace data in a data space.

Подробнее
02-01-2014 дата публикации

METHODS, SYSTEMS AND APPARATUS TO CAPTURE ERROR CONDITIONS IN LIGHTWEIGHT VIRTUAL MACHINE MANAGERS

Номер: US20140006877A1
Принадлежит:

Methods and apparatus are disclosed to capture error conditions in lightweight virtual machine managers. A disclosed example method includes defining a shared memory structure between the VMM and a virtual machine (VM), when the VM is spawned by the VMM, installing an abort handler on the VM associated with a vector value, in response to detecting an error, transferring VMM state information to the shared memory structure, and invoking the abort handler on the VM to transfer contents of the shared memory structure to a non-volatile memory. 1. A method to capture error information from a virtual machine manager (VMM) , comprising:defining a shared memory structure between the VMM and a virtual machine (VM);when the VM is spawned by the VMM, installing an abort handler on the VM associated with a vector value;in response to detecting an error, transferring VMM state information to the shared memory structure; andinvoking the abort handler on the VM to transfer contents of the shared memory structure to a non-volatile memory.2. A method as defined in claim 1 , wherein the VMM does not include file system access support.3. A method as defined in claim 1 , wherein the shared memory structure comprises random access memory (RAM).4. A method as defined in claim 3 , further comprising configuring the RAM with read-only access for the VM.5. A method as defined in claim 1 , further comprising configuring an interrupt description table to store the vector value.6. (canceled)7. (canceled)8. A method as defined in claim 1 , further comprising determining a severity of the error.9. A method as defined in claim 8 , further comprising gathering a first resolution of the error information when the severity is of a first level claim 8 , and gathering a second resolution of the error information when the severity is of a second level.10. A method as defined in claim 1 , wherein the VM comprises a guest operating system.11. A method as defined in claim 1 , further comprising invoking ...

Подробнее
09-01-2014 дата публикации

Selective Monitoring of Software Applications

Номер: US20140013310A1
Автор: CROSBY Peter Anthony
Принадлежит: Riverbed Technology, Inc.

Au application monitoring system autonomously selects routines for performance monitoring based on characteristics of the content of the routines. These characteristics are preferably related to aspects of routines that are likely candidates for performance improvement, such as repetitive loops, event waits, synchronized blocks, and on. Routines that appear to be relatively un-improvable are excluded from initial monitoring, and routines that are subsequently determined to be relatively un-improvable, based on performance analysis and/or user feedback, are excluded from future monitoring. The determination of each routine's candidacy for monitoring is maintained over time, so that each subsequent monitoring session need not repeat the determinations. Changed routines are routinely re-monitored and/or re-assessed to affirm or modify the routine's candidacy for subsequent monitoring. 1. (canceled)2. A system comprising:an analysis module configured to analyze routines within an application code and to assign respective monitoring candidacy measures to each of the routines based on respective content of the routines;a selection module configured to select a routine from among the routines for monitoring based on the respective monitoring candidacy measures, and augment the application code with monitoring code configured to facilitate collection of performance data for the selected routine;a memory configured to store the augmented application code and the respective monitoring candidacy measures between executions of the application code; anda processor configured to execute the modules.3. The system of claim 2 , further comprising:a performance analysis module configured to modify the monitoring candidacy measure assigned to the selected routine based on the performance data.4. The system of claim 2 , wherein:the monitoring code comprises a monitoring identifier corresponding to the selected routine,the selection module is further configured to selectively change the ...

Подробнее
09-01-2014 дата публикации

Iterative Bottleneck Detector for Executing Applications

Номер: US20140013311A1
Принадлежит: Concurix Corp

A bottleneck detector may use an iterative method to identify a bottleneck with specificity. An automated checkpoint inserter may place checkpoints in an application. When a bottleneck is detected in an area of an application, the first set of checkpoints may be removed and a new set of checkpoints may be placed in the area of the bottleneck. The process may iterate until a bottleneck may be identified with enough specificity to aid a developer or administrator of an application. In some cases, the process may identify a specific function or line of code where a bottleneck occurs.

Подробнее
09-01-2014 дата публикации

Thread folding tool

Номер: US20140013329A1
Автор: Kirk J. Krauss
Принадлежит: International Business Machines Corp

A computer-implemented method of performing runtime analysis on and control of a multithreaded computer program. One embodiment of the present invention can include identifying threads of a computer program to be analyzed. Under control of a supervisor thread, a plurality of the identified threads can be folded together to be executed as a folded thread. The execution of the folded thread can be monitored to determine a status of the identified threads. An indicator corresponding to the determined status of the identified threads can be presented in a user interface that is presented on a display.

Подробнее
16-01-2014 дата публикации

Method of ascertaining primary cause of memory consumption in program, and computer system and computer program for the same

Номер: US20140019810A1
Принадлежит: International Business Machines Corp

A method of holding information for identifying a cause for an object becoming problematic and presenting the information to a user. The method ascertains the cause of memory consumption by a program in a computer system. This method includes: acquiring a first call path related to the creation of an object from a memory; acquiring a second call path related to the connection to the object from the memory; and determining a common part of the acquired first and second call paths, wherein the common part indicates the cause in the program.

Подробнее
16-01-2014 дата публикации

Parallel Tracing for Performance and Detail

Номер: US20140019985A1
Автор: Russell S. Krajec
Принадлежит: Concurix Corp

A parallel tracer may perform detailed or heavily instrumented analysis of an application in parallel with a performance or lightly instrumented version of the application. Both versions of the application may operate on the same input stream, but with the heavily instrumented version having different performance results than the lightly instrumented version. The tracing results may be used for various analyses, including optimization and debugging.

Подробнее
30-01-2014 дата публикации

Causation isolation using a configuration item metric identified based on event classification

Номер: US20140032159A1
Принадлежит: Hewlett Packard Development Co LP

Based on an event classification for an event of a cross-domain computing environment, a metric of a configuration item is obtained and used to isolate a causation of the event.

Подробнее
30-01-2014 дата публикации

Method and device for displaying process information

Номер: US20140032559A1
Принадлежит: Tencent Technology Shenzhen Co Ltd

The present invention discloses a method and a device for displaying process information, which belongs to the field of computer technologies. The method may include: scanning a memory of a device for running processes; categorizing and ranking the scanned running processes according to a preset process display format; and displaying each process category after categorization and running processes within each process category, and displaying information related to the process category and the running processes within the process category; and/or displaying ranked running processes, and displaying related information corresponding to the ranked running processes. In the present invention, by presetting a process categorization format, the processes are displayed according to categorization and ranking when a user views the process information, thereby improving the user's understanding of the running processes in the device, making the management of the running processes more efficient, and further enhancing the security of the system.

Подробнее
30-01-2014 дата публикации

APPARATUS AND METHOD FOR DETECTING ERROR

Номер: US20140032976A1
Принадлежит: SAMSUNG ELECTRONICS CO., LTD.

An apparatus and method for detecting an error occurring when an application program is executed in a computer environment is provided. The error detection apparatus may measure a deterministic progress index (DPI) and a program counter (PC) value when an instruction is executed, set, as a verification set, a DPI and a PC value measured when the instruction is executed without causing an error, set, as a measurement set, the DPI and the PC value measured when an instruction is executed, and detect a runtime error of the instruction by comparing the measurement set to the verification set. 1. An apparatus for detecting an error , the apparatus comprising:a measuring unit configured to measure a deterministic progress index (DPI) and a program counter (PC) value when an instruction is executed;a setting unit configured to set, as a verification set, a DPI and a PC value measured when the instruction is executed without an error; anda detector to set, as a measurement set, the DPI and the PC value measured by the measuring unit, and to detect a runtime error of the instruction by comparing the measurement set to the verification set.2. The apparatus of claim 1 , further comprising:a determining unit configured to determine, based on a predetermined criterion, whether an execution scheme of the instruction corresponds to a deterministic execution scheme having a regular cycle or a nondeterministic execution scheme having an irregular delay cycle;a deterministic progress counter (DPC) to generate the DPI with respect to an instruction that is executed using the deterministic execution scheme; anda PC to generate the PC value indicating a position of an instruction that is being executed on a program.3. The apparatus of claim 1 , wherein the detector detects the runtime error when the DPI and the PC value of the measurement set differ from the DPI and the PC value of the verification set.4. The apparatus of claim 1 , wherein the detector comprises:a real time error ...

Подробнее
30-01-2014 дата публикации

SERVER AND METHOD OF MONITORING BASEBOARD MANAGEMENT CONTROLLER

Номер: US20140032978A1
Автор: Huang Yu-Chen
Принадлежит:

A server includes a baseboard management controller. The server controls a real time clock to send a clock signal to a platform controller hub (PCH) in a predefined interval. When a system management interrupt has been activated, the server executes a monitoring instruction to obtain a state value of the BMC. When the state value of the BMC is not the same as a normal state value, the server is restarted. An event log of the BMC is written to the BMC and an alarm is raised. 1. A server comprising:a processor; anda non-transitory computer-readable medium that stores one or more programs, which comprise instructions which when executed by the processor of the electronic device, performs operations of:(a) controlling a real time clock (RTC) of the server to periodically send a clock signal to a platform controller hub (PCH) of the server;(b) activating a system management interrupt after the PCH has received the clock signal;(c) executing a monitoring instruction to obtain a state value of a baseboard management controller (BMC); and(d) restarting the server, writing an event log of the BMC and raising an alarm when the last state value of the BMC is not equal to a normal state value.2. The server as claimed in claim 1 , after operation (b) and before operation (c) the method further comprising:setting a mode of an operating system of the server to a system management mode.3. The server as claimed in claim 2 , wherein the operations further comprise:determining the operating system of the server is malfunctioning when the state value of the BMC is not received by the server.4. The server as claimed in claim 1 , wherein the monitoring instruction is stored in the system management random access memory (SMRAM) of the server.5. A method being executed by a processor of a server claim 1 , comprising steps:(a) controlling a real time clock (RTC) of the server to periodically send a clock signal to a platform controller hub (PCH) of the server;(b) activating a system ...

Подробнее
06-02-2014 дата публикации

MANAGING CODE INSTRUMENTATION IN A PRODUCTION COMPUTER PROGRAM

Номер: US20140040866A1
Принадлежит:

A method, system, and/or computer program product manages code instrumentation in a production computer program. Performance data from instrumentation code associated with a portion of code of a production computer program is received. One or more processors compare the performance data to a predetermined performance threshold. In response to the performance data meeting the predetermined performance threshold, one or more processors remove the instrumentation code for the portion of code. 1. A method for managing code instrumentation in a production computer program , said method comprising:receiving, by one or more processors, performance data from instrumentation code associated with a portion of code of a production computer program;comparing, by one or more processors, said performance data to a predetermined performance threshold; andin response to said performance data meeting said predetermined performance threshold, removing, by one or more processors, said instrumentation code for said portion of code.2. The method of claim 1 , wherein said instrumentation code comprises code coverage code claim 1 , said performance data comprises code coverage data for said portion of code claim 1 , and said predetermined performance threshold comprises a predetermined measure of code coverage.3. The method of claim 1 , further comprising: in response to an error being reported for said production computer program, determining, by one or more processors, whether said portion of code is affected by a fix provided for said error;', 'in response to said portion of code being unaffected by said fix, comparing, by one or more processors, said performance data against the predetermined performance threshold; and', 'in response to said performance data meeting said predetermined performance threshold, removing, by one or more processors, said instrumentation code for said portion of code., 'determining, by one or more processors, whether or not an error has been reported for ...

Подробнее
13-02-2014 дата публикации

Network Debugging

Номер: US20140047274A1
Принадлежит: NEC Laboratories America, Inc.

A debugging system used for a data center in a network is disclosed. The system includes a monitoring engine to monitor network traffic by collecting traffic information from a network controller, a modeling engine to model an application signature, an infrastructure signature, and a task signature using a monitored log, a debugging engine to detect a change in the application signature between a working status and a non-working status using a reference log and a problem log, and to validate the change using the task signature, and a providing unit to provide toubleshooting information, wherein an unknown change in the application signature is correlated to a known problem class by considering a dependency to a change in the infrastructure signature. Other methods and systems also are disclosed. 1. A debugging system used for a data center in a network , the system comprising:a monitoring engine to monitor network traffic by collecting traffic information from a network controller;a modeling engine to model an application signature, an infrastructure signature, and a task signature using a monitored log;a debugging engine to detect a change in the application signature between a working status and a non-working status using a reference log and a problem log, and to validate the change using the task signature; anda providing unit to provide toubleshooting information,wherein an unknown change in the application signature is correlated to a known problem class by considering a dependency to a change in the infrastructure signature.2. The debugging system as in claim 1 ,wherein the network comprises an OpenFlow network and the traffic information is collected through at least one of PacketIn and PacketOut messages.3. The debugging system as in claim 2 ,wherein the application signature is modeled by at least one of connectivity graph (CG), delay distribution (DD), component interaction (CI), partial correlation (PC), and flow statistics (FS).4. The debugging system as ...

Подробнее
13-02-2014 дата публикации

Memory system and memory controller

Номер: US20140047281A1
Принадлежит: Toshiba Corp

According to one embodiment, a memory system includes a NAND-type flash memory and a memory controller. The memory controller includes a monitoring module and a determination module. The monitoring module acquires an elapsed time from the start of data erase of a first block in the NAND-type flash memory. The determination module determines whether the elapsed time has exceeded a reference time before completion of the data write in the first block.

Подробнее
27-02-2014 дата публикации

Autonomic Hotspot Profiling Using Paired Performance Sampling

Номер: US20140059334A1
Принадлежит: International Business Machines Corp

A processor performance profiler is enabled to for identify specific instructions causing performance issues within a program being executed by a microprocessor through random sampling to find the worst-case offenders of a particular event type such as a cache miss or a branch mis-prediction. Tracking all instructions causing a particular event generates large data logs, creates performance penalties, and makes code analysis more difficult. However, by identifying and tracking the worst offenders within a random sample of events without having to hash all events results in smaller memory requirements for the performance profiler, lower performance impact while profiling, and decreased complexity to analyze the program to identify major performance issues, which, in turn, enables better optimization of the program in shorter developer time.

Подробнее
27-02-2014 дата публикации

HARDWARE-ASSISTED PROGRAM TRACE COLLECTION WITH SELECTABLE CALL-SIGNATURE CAPTURE

Номер: US20140059523A1

Hardware-assisted program tracing is facilitated by a processor that includes a root instruction address register, a program trace signature computation unit and a call signature register. When a program instruction having an address matching the root instruction address register is executed, a program trace signature is captured in the call signature register and capture of branch history is commenced. By accumulating different values of the call signature register, for example in response to an interrupt generated when the root instruction is executed, software that performs program tracing can obtain signatures of all of the multiple execution paths that lead to the root instruction, which is also specified by software in order to set different root instructions for program tracing. In an alternative implementation, a storage for multiple call signatures is provided in the processor and read at once by the software. 1. A method of collecting program trace information of program code executed by a processor , the method comprising:computing a program call signature at program calls and returns within the program code that uniquely identifies a call and return history extending to a currently executing instruction;specifying a root instruction at which to collect the program call signature by storing an address of the root instruction in a root instruction register of the processor;during execution of the program code, detecting that the execution has reached the root instruction; andresponsive to detecting that the execution has reached the root instruction, storing a current value of the program call signature in a call signature register and commencing capture of program trace information in a branch history buffer as execution of the program code proceeds.2. The method of claim 1 , further comprising specifying a particular value of the program call signature at which to commence capture of program trace information claim 1 , wherein the detecting further ...

Подробнее
27-02-2014 дата публикации

Virtual machine state tracking using object based storage

Номер: US20140059538A1
Принадлежит: V3 Systems Inc

A virtual machine state tracking mechanism that uses object based storage in order to track state information for at least some of the virtual machines that are operating in an environment. In some cases, the virtual machine environment includes virtual machine appliances on which virtual machines are run, and a centralized storage. For one, some, or all of the virtual machines, a first portion of the virtual machine state may be kept on an appliance, whereas a second portion is kept on the centralized storage. In some cases, the object based storage is resident on an appliance within the virtual machine environment, and also stores the first portion of the virtual machine state as well as the state tracking information. The state tracking information may be used to efficiently check in and check out associated virtual machines.

Подробнее
13-03-2014 дата публикации

Execution History Tracing Method

Номер: US20140075249A1
Автор: SATO Shuhei, Sato Takashi
Принадлежит: SPANSION LLC

An execution history tracing method includes tracing an execution history of a CPU upon executing, in a semiconductor device including the CPU, a program by using the CPU, for one or a tracing target, from outside the semiconductor device via software. The execution history tracing method includes recording, in a buffer, target information as trace information about an execution of the one or the tracing target, for each instruction cycle in which the target information is produced as the execution history; and performing data sorting by using the software to group the trace information about the execution of the one or the tracing target, the trace information being recorded for the each instruction execution cycle, for each of the one or the tracing target. 1. A method , comprising:recording trace information about a tracing target during an instruction execution cycle in a buffer;grouping the recorded trace information with additional trace information recorded during a different instruction execution cycle; andgenerating an instruction notation based on the grouped recorded trace information and the additional trace information.2. The method of claim 1 , further comprising storing the instruction notation in a trace list.3. The method of claim 1 , further comprising obtaining a program counter value for the recorded trace information.4. The method of claim 1 , further comprising determining that the tracing target relates to a branch instruction.5. The method of claim 4 , wherein recording trace information comprises recording a branch factor and a branch destination program counter.6. The method of claim 1 , further comprising determining that the tracing target relates to a write access.7. The method of claim 6 , wherein recording trace information comprises recording an access size claim 6 , and access address claim 6 , and write data.8. The method of claim 1 , further comprising determining that the tracing target relates to a read access.98. The method of ...

Подробнее
20-03-2014 дата публикации

METHOD FOR DETERMINISTIC STRESS BASED RISK REDUCTION

Номер: US20140081583A1
Принадлежит:

A deterministic risk reduction method for product reliability comprising the steps of: receiving a plurality of parameters associated with at least one of a goal concept,desired functionality and performance criteria for said product; performing an analysis of said product, said analysis comprising levels of cause and effect for identifying and quantifying key performance factors and failure mechanisms associated with said product;developing test protocols and subjecting said product to stress tests corresponding to said test protocols to determine at least one operating limit for said product, whereby a relationship between said stress and expected life of said product is provided; and estimating said product life based on said key performance factors and said stress tests. 1) A method to evaluate the service life of a product within a system based upon its specification and operating conditions comprising steps of:a) determining a product design intent;b) generating a design intent profile, said profile being a graphical representation of the interface parameters and the product state and the system state;c) identifying key performance factors (KPF) of the product and system operating stress factors;d) generating a Key Performance Factor Topography (KPFT) for each KPF;e) developing a Parameterised Stress Model (PSM) for each operating stress factor;f) developing a Parameterised Sensitivity Model by testing how changes in the component's design parameters affect the end of life; andg) generating a stress-life model for the product.2) The method of claim 1 , wherein said product design intent comprising:a) the product state based upon the system state and interface;b) the product functionality based on the product state;c) the key performance factors (KPFs) for the product based on the product functionality; andd) the interface conditions and external effects affecting the key performance factors.3) The method of claim 2 , wherein said product state being any one or ...

Подробнее
20-03-2014 дата публикации

Distributed backup system for determining access destination based on multiple performance indexes

Номер: US20140081919A1
Принадлежит: HITACHI LTD

A backup system having duplicated file system data and composed of a plurality of storage systems having different performances is provided, wherein a processing time required for backup of a small-sized file or an on-demand restoration of a file is reduced. A distributed backup system composed of a storage system and a plurality of backup units is equipped with a function for selecting a backup unit based on a plurality of performance indexes, and a requested data transfer size for performing backup or restoration is considered when performing the selection.

Подробнее
20-03-2014 дата публикации

METHOD AND SYSTEM FOR MONITORING THE STATE OF HEALTH OF AN ELECTRONIC DATA CARRIER

Номер: US20140082429A1
Принадлежит: NXP B.V.

According to an aspect of the invention, a method for monitoring the state of health of an electronic data carrier is conceived, wherein a reader device operable to read data from said electronic data carrier determines the state of health of the electronic data carrier by reading a parameter value indicative of said state of health from the electronic data carrier. According to a further aspect of the invention, a system for monitoring the state of health of an electronic data carrier is provided, the system comprising a reader device operable to read data from said electronic data carrier, wherein said reader device is arranged to determine the state of health of the electronic data carrier by reading a parameter value indicative of said state of health from the electronic data carrier. 1. A method for monitoring the state of health of an electronic data carrier , wherein a reader device operable to read data from said electronic data carrier determines the state of health of the electronic data carrier by reading a parameter value indicative of said state of health from the electronic data carrier such that the parameter value is indicative of a change in the amount of power required to read data from the electronic data carrier.2. (canceled)3. A method as claimed in claim 2 , wherein the amount of power required to read data from the electronic data carrier is derived from the performance of a power rectifier embedded in said electronic data carrier.4. A method as claimed in claim 3 , wherein the performance of said power rectifier is determined by monitoring the voltage ripple of the power rectifier.5. A method as claimed in claim 3 , wherein the performance of said power rectifier is determined by repeatedly comparing the power received at an input of the power rectifier with the power delivered at an output of the power rectifier.6. A method as claimed in claim 3 , wherein the performance of said power rectifier is determined by monitoring the operation of a ...

Подробнее
27-03-2014 дата публикации

Optimizing System Throughput By Automatically Altering Thread Co-Execution Based On Operating System Directives

Номер: US20140089637A1
Принадлежит: International Business Machines Corp

A technique for optimizing program instruction execution throughput in a central processing unit core (CPU). The CPU implements a simultaneous multithreading (SMT) operational mode wherein program instructions associated with at least two software threads are executed in parallel as hardware threads while sharing one or more hardware resources used by the CPU, such as cache memory, translation lookaside buffers, functional execution units, etc. As part of the SMT mode, the CPU implements an autothread (AT) operational mode. During the AT operational mode, a determination is made whether there is a resource conflict between the hardware threads that undermines instruction execution throughput. If a resource conflict is detected, the CPU adjusts the relative instruction execution rates of the hardware threads based on relative priorities of the software threads.

Подробнее
03-04-2014 дата публикации

EVALUATING UTILIZATION OF ONE OR MORE COMPUTER SYSTEMS

Номер: US20140095696A1
Принадлежит: Emerson Electric Co.

A method of evaluating utilization of one or more computer systems includes monitoring utilization of a computer system for each of a plurality of time periods in a reporting period and, for each time period, assigning a numeric value based on the monitored utilization and a predefined scale of utilization ranges. The method also includes calculating an overall numeric value for the reporting period by combining the numeric values assigned to the plurality of time periods. The overall numeric value represents the utilization of the computer system during the reporting period. Additional methods and related computer systems are also disclosed. 1. A method of evaluating utilization of one or more computer systems , the method comprising:monitoring utilization of a computer system for each of a plurality of time periods in a reporting period;for each time period, assigning a numeric value based on the monitored utilization and a predefined scale of utilization ranges; andcalculating an overall numeric value for the reporting period by combining the numeric values assigned to the plurality of time periods, the overall numeric value representing the utilization of the computer system during the reporting period.2. The method of wherein monitoring includes monitoring the utilization of the computer system for each of a plurality of intervals in each time period claim 1 , and wherein assigning includes assigning claim 1 , to each time period claim 1 , the numeric value based on the monitored utilization during one or more of the intervals of such time period.3. The method of wherein assigning includes assigning claim 2 , to each time period claim 2 , the numeric value based on the monitored utilization of one or more of the intervals having the greatest utilization during such time period.4. The method of wherein assigning includes assigning claim 3 , to each time period claim 3 , the numeric value based on the monitored utilization of only one of the intervals having the ...

Подробнее
03-04-2014 дата публикации

System and Method for Correct Execution of Software

Номер: US20140095936A1

In an embodiment of the invention an application provider may include “tracing elements” in a target software application. While working with the application the trace elements are detected and provide a “baseline trace” indicating proper application execution. The provider then supplies the application, which still includes the trace elements, and the baseline trace to a user. The user operates the application to produce a “real-time trace” based on the application still having trace elements that produce trace events. A comparator then compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. If the level of assurance is low, an embodiment may trigger a hardware interrupt or similar event to prevent further execution of software. Other embodiments are described herein.

Подробнее
03-04-2014 дата публикации

DYNAMIC HARDWARE TRACE SUPPORTING MULTIPHASE OPERATIONS

Номер: US20140095941A1
Принадлежит:

A method and system for tracing in a data processing system. The method includes receiving a plurality of signals associated with an operation during execution of the operation. The method also includes, in response to an indication that the operation is a multiphase operation, during execution of the operation, selection logic, during a first phase of the multiphase operation, selecting and outputting as a trace signal a first signal of the plurality of signals, and during a second phase of the multiphase operation, selecting and outputting as the trace signal a second signal of the plurality of signals. 1. A method for tracing in a data processing system , the method comprising:receiving a plurality of signals associated with an operation during execution of the operation; and during a first phase of the multiphase operation, selecting and outputting as a trace signal a first signal of the plurality of signals; and', 'during a second phase of the multiphase operation, selecting and outputting as the trace signal a second signal of the plurality of signals., 'in response to an indication that the operation is a multiphase operation, during execution of the operation, selection logic2. The method of claim 1 , wherein the trace signal is a first trace signal claim 1 , the method further comprising:during execution of the multiphase operation, selecting and outputting a third signal as a second trace signal, wherein the first trace signal and the second trace signal are selected in parallel.3. The method of claim 1 , wherein the method further comprises the selection logic receiving a clock cycle indication;wherein selecting and outputting the first signal comprises selecting and outputting the first signal in response to the clock cycle indication indicating a first clock cycle of the first phase; andwherein the method further comprises the selection logic selecting and outputting as the trace signal a third signal of the plurality of signals in response to the clock ...

Подробнее
03-04-2014 дата публикации

PROVIDING SERVICE ADDRESS SPACE FOR DIAGNOSTICS COLLECTION

Номер: US20140095942A1

A method and system are provided for providing a service address space for diagnostics collection. The method includes: providing a service co-processor attached to a main processor, wherein the service co-processor maintains an independent copy of the main processor's address space in the form of a service address space; and updating the service address space by receiving storage update packets from the main processor and applying the storage update packets to the service address space. 1. A method for providing service address space for diagnostics collection , comprising:providing a service co-processor attached to a main processor, wherein the service co-processor maintains an independent copy of the main processor's address space in the form of a service address space; andupdating the service address space by receiving storage update packets from the main processor and applying the storage update packets to the service address space.2. The method as claimed in claim 1 , further comprising delegating collection of diagnostic data to the service co-processor by sending a collection command from the main processor to the service co-processor for collection of data from the service address space.3. The method as claimed in claim 1 , further comprising claim 1 , at the main processor:monitoring for instructions that modify the main processor's address space;generating the storage update packets; andsending the storage update packets on an instruction pipe to the service co-processor.4. The method as claimed in claim 1 , further comprising claim 1 , at the service co-processor:monitoring an instruction pipe for the storage update packets; andapplying the storage update packets to the service address space.5. The method as claimed in claim 1 , further comprising initializing the service address space by copying the main address space.6. The method as claimed in claim 1 , further comprising:queuing the storage update packets in an instruction pipe from the main ...

Подробнее
10-04-2014 дата публикации

MODULAR REFRIGERATION UNIT HEALTH MONITORING

Номер: US20140100818A1

A modular refrigeration unit (MRU) health monitor includes a log data input configured to receive log data from an MRU, the log data comprising a plurality of datapoints, each of the plurality of datapoints comprising a position of a control valve of the MRU and a corresponding time; and MRU health monitoring logic configured to determine a plurality of MRU parameters from log data received on the log data input; determine a plurality of MRU health flags based on the MRU parameters; add the plurality of MRU health flags to determine an MRU health score; determine whether the MRU health score is higher than a replacement threshold; and indicate replacement of the MRU in the event the MRU health score is higher than the replacement threshold. 1. A modular refrigeration unit (MRU) health monitor , comprising:a log data input configured to receive log data from an MRU, the log data comprising a plurality of datapoints, each of the plurality of datapoints comprising a position of a control valve of the MRU and a corresponding time; and determine a plurality of MRU parameters from log data received on the log data input;', 'determine a plurality of MRU health flags based on the MRU parameters;', 'add the plurality of MRU health flags to determine an MRU health score;', 'determine whether the MRU health score is higher than a replacement threshold; and', 'indicate replacement of the MRU in the event the MRU health score is higher than the replacement threshold., 'MRU health monitoring logic configured to2. The MRU health monitor of claim 1 , further comprising scheduling a replacement of the MRU in the event replacement of the MRU is indicated.3. The MRU health monitor of claim 1 , wherein the plurality of MRU health flags comprises an overtemperature recovery (OTR) rate flag claim 1 , a control valve position increase flag claim 1 , control valve position average flag claim 1 , an expected operating threshold flag claim 1 , and an OTR flag claim 1 , and wherein each of ...

Подробнее
10-04-2014 дата публикации

Method for generating terminal log and terminal

Номер: US20140101104A1
Принадлежит: Huawei Technologies Co Ltd

Embodiments of the present invention provide a method for generating a terminal log and a terminal. The method includes: obtaining sensor information and/or use information of a mobile terminal; generating first log information according to the sensor information and/or the use information; receiving second log information input by a user; and combining the first log information with the second log information to generate terminal log information; the terminal may receive modification information input by the user and update the first log information according to the modification information. In the embodiments of the present invention, by obtaining related information, a log is automatically generated; and in combination with a modification of a user and a log written by the user, it is ensured that log content required by the user is accurately obtained.

Подробнее
06-01-2022 дата публикации

METADATA BASED DATA REPLICATION

Номер: US20220004459A1
Принадлежит:

A plurality of computing nodes is monitored for updates to one or more files located on the plurality. Based on the monitoring, a first file operation is detected that is related to a first file located on a first node. The first file is related to a first copy that is located on a second node. Based on the first file operation, it is determined that the first file operation is a copy operation of the first file to a second file located on the first node. A copy command related to the first file is transferred, in response to the copy operation, to the second node. In response to the copy operation, a second copy file is created on the second computing node of the plurality. The second copy file is related to the second file located on the first computing node of the plurality. 1. A method comprising:monitoring, by a data replication system, a plurality of computing nodes for updates to one or more files located on the plurality;detecting, by the data replication system and based on the monitoring, a first file operation related to a first file, the first file located on a first computing node of the plurality,wherein the first file is related to a first copy file, the first copy file located on a second computing node of the plurality;determining, by the data replication system and based on the first file operation, the first file operation is a copy operation of the first file to a second file, the second file located on the first computing node of the plurality;transferring, by the data replication system and in response to the copy operation, a copy command related to the first file to the second computing node of the plurality; andcreating, by the data replication system and in response to the copy command, a second copy file on the second computing node of the plurality,wherein the second copy file is related to the second file located on the first computing node of the plurality, wherein the creation is based solely on information from within the copy command ...

Подробнее
06-01-2022 дата публикации

Capturing query execution statistics

Номер: US20220004555A1
Автор: Avi Huber, Rupesh Kumar
Принадлежит: Oracle International Corp

Techniques for capturing query execution statistics are disclosed. The disclosed system determines which queries are executing during a sampling interval. The system identifies related queries that share similarity criteria with the currently executing query. The system obtains query execution statistics for the query executing during the sampling interval and any related queries. The system generates or obtains statistics during a monitoring window that spans a longer period of time than a single intervening period between the current sampling interval and a prior interval. The statistics are stored in permanent storage or transmitted to a requesting computer. The system refrains from analyzing statistics for queries (and any related queries) that did not execute during a current sampling interval.

Подробнее
05-01-2017 дата публикации

COLLABORATIVE PROCESSOR AND SYSTEM PERFORMANCE AND POWER MANAGEMENT

Номер: US20170003724A1
Принадлежит:

The present invention relates to a platform power management scheme. In some embodiments, a platform provides a relative performance scale using one or more parameters to be requested by an OSPM system. 110-. (canceled)11. An apparatus comprising: one or more capabilities registers;', 'one or more control registers; and', 'one or more feedback registers;, 'one or more platform power management interface registers includinglogic to read the one or more platform power management interface registers; anda power control unit (PCU) residing in a processor, wherein the PCU is to provide a requested performance according to the read one or more platform power management interface registers.12. The apparatus of claim 11 , wherein the one or more capabilities registers indicate performance scale parameters claim 11 , capabilities or thresholds.13. The apparatus of claim 11 , wherein the one or more control registers indicate requested performance from the processor.14. The apparatus of claim 11 , wherein the one or more feedback registers indicate delivered performance parameters.15. The apparatus of claim 14 , wherein the delivered performance parameters are estimated claim 14 , measured claim 14 , or monitored performance parameters.16. The apparatus of claim 11 , wherein the one or more platform power management interface registers are accessible by an operating system directed configuration and power management (OSPM).17. The apparatus of comprises logic to select a plurality of performance values claim 11 , wherein a platform is inhibited from varying a performance above or below a selected performance level when selected.18. The apparatus of comprises logic to evaluate platform performance for the plurality of selected performance values claim 17 , wherein an OS is to select values in the performance value range from a Lowest through a Nominal value claim 17 , while running a characterization workload.19. The apparatus of claim 17 , wherein the platform is inhibited by ...

Подробнее
05-01-2017 дата публикации

MONITORING METHOD

Номер: US20170004026A1
Автор: Matsubara Keisuke
Принадлежит:

An information processing system in which a monitoring device can detect illegal and/or abnormal operations in a system to be monitored, without using detailed information of the system, is provided. In a target device an operation data generation unit generates operation data as data of encoding a set of operations related to a predetermined program executed in an execution environment and transmits the operation data to the monitoring device In the monitoring device an operation pattern storing unit stores an operation pattern as operation data related to a set of operations to be detected. An operation data decision unit decides that the operation to be detected is executed in the execution unit when the operation data received from the target device matches the operation pattern and notifies of execution of the operation to be detected. 1. A monitoring method comprising:receiving operation data indicating instructions executed in a program;determining an operation is executed by the program when the operation data matches a pattern data indicating instructions to be detected; andoutputting a notification indicating the determination.2. The monitoring method according to claim 1 , wherein the instructions includes function calls.3. The monitoring method according to claim 1 , wherein the operation data is obtained by encoding the instructions executed in the program.4. The monitoring method according to claim 3 , wherein the operation data includes an array of bits indicating the instructions executed in the program.5. The monitoring method according to claim 3 , wherein the operation data includes an array of bits represented by a Bloom Filter representing the instructions executed in the program.6. The monitoring method according to claim 1 , wherein the pattern data is obtained by encoding the instructions to be detected.7. The monitoring method according to claim 6 , wherein the pattern data includes an array of bits indicating the instructions to be detected ...

Подробнее
05-01-2017 дата публикации

EXTENSIBLE INDEXING SYSTEM EVALUATION AND RECOMMENDATION

Номер: US20170004155A1
Принадлежит:

Methods and apparatus, including computer program products, implementing and using techniques for evaluating indexing systems. Comparative tests are performed on two or more indexing systems. Each test uses one or more of: benchmarks, metrics, estimates of input data, desired index configuration, and performance constraints. A recommendation is automatically provided for an indexing system and an optimal configuration of the indexing system is also provided, based on an evaluation metrics from the tests. 1. A computer-implemented method for evaluating indexing systems , comprising:performing comparative tests on two or more indexing systems, wherein each test uses one or more of: benchmarks, metrics, estimates of input data, desired index configuration, and performance constraints; andautomatically providing a recommendation for an indexing system and an optimal configuration of the indexing system, based on an evaluation metrics from the tests.2. The method of claim 1 , further comprising:generating multiple test configurations to be used during the comparative testing, based on one or more of the benchmarks, the metrics, the estimates of input data, the desired index configuration, and the performance constraints.3. The method of claim 2 , further comprising:reducing the number of test configurations based on received user input.4. The method of claim 2 , wherein performing comparative tests includes:automatically deploying the test configurations in a pool of computing resources prior to performing the comparative tests.5. The method of claim 4 , wherein the test configurations are deployed iteratively.6. The method of claim 4 , wherein the test configurations are deployed in parallel.7. The method of claim 1 , further comprising:monitoring system parameters while performing the comparative tests; andstoring the results of the monitoring for comparative analysis.8. The method of claim 1 , wherein the recommendation is a ranked recommendation of optimal ...

Подробнее
07-01-2016 дата публикации

STORAGE SYSTEM WITH TRACE-BASED MANAGEMENT

Номер: US20160004618A1

Embodiments of the invention relate to storage systems, and for recording event records into a log. Different statistics may be tallied from the log, with the different statistics generating different statistical measurements. The aspect of processing of I/O and preparation of statistical measurements are separated, thereby enabling data structures and algorithms which would not be considered feasible for use as part of I/O processing, because they may compromise the performance or other essential characteristic of I/O processing, to be employed. 1. A method comprising:processing an I/O transaction and recording transaction metadata into a log, wherein the log includes a subset of two or more transaction operations;operating a summarizer upon the log to generate a statistical measurement; andusing the statistical measurement, selecting one or more parameter values for supporting a decision about a parameter setting.2. The method of claim 1 , wherein the log contains a record of a representative subset of transactions within a designated category performed in a time window.3. The method of claim 1 , further comprising replacing the summarizer while maintaining recordation of the transaction metadata into the log.4. The method of claim 3 , further comprising deploying a new statistical measurement from the replaced summarizer.5. The method of claim 1 , further comprising the summarizer being a query language that parameterizes an associated query of the event log.6. The method of claim 5 , further comprising an external stimulus activating the summarizer.7. A computer program product for generating a statistical measurement and application of the measurement to a parameter setting claim 5 , the computer program product comprising a computer readable storage device having program code embodied therewith claim 5 , the program code executable by a processing unit to:process an I/O transaction and record transaction metadata into a log, wherein the log includes a subset ...

Подробнее