G06F2209/542

MEMORY MANAGEMENT
20170286171 · 2017-10-05 ·

System and techniques for memory management are described herein. A request for an adjusted process-value for a process may be received. Here, the adjusted process-value may be used to compare resident processes to determine which resident process will be terminated in certain circumstances. In response to the request for the adjusted process-value, a launch-time weight for the process may be obtained. The launch-time weight may be combined with a process-value to create an adjusted process-value. The adjusted process-value may then be returned to the requestor.

Systems, methods, and computer-readable media for analyzing intercepted telemetry events
11243861 · 2022-02-08 · ·

Systems, methods, and computer-readable media for intercepting telemetry events obtained during operation of an application and analyzing the telemetry events are provided. The telemetry events are intercepted at the library level by interposing on application calls to a native library. The telemetry events are collected and transmitted to a platform that analyzes the collected events and presents information based on the analysis.

System and method for link analysis based on image processing

Methods and systems to identify relationships between individuals by analyzing digital images and automatically detecting individuals who appear together in the images. A link analysis system accepts one or more digital images, and automatically recognizes individuals who appear together in the images. The system may recognize the individuals, for example, by applying a suitable face recognition process to the images. Upon identifying individuals who appear together, the system defines a relationship between them and acts upon the relationship.

Invoking a firmware function
09727390 · 2017-08-08 · ·

A computer system firmware is provided that includes functionality for allowing a calling application to invoke firmware functions through the use of firmware services for getting and setting firmware variables. Firmware functions may be defined and mapped to firmware variable names. When a request is received by the firmware to get or set a value for a particular firmware variable, the firmware determines whether a custom firmware function has been defined that corresponds to the requested firmware variable. If a custom function has been defined that corresponds to the requested firmware variable, then the corresponding custom function is executed rather than the requested get or set operation. A firmware setup application might utilize this mechanism to obtain information from a firmware for use in modifying the configuration of a computer system that would not otherwise be available to the setup application.

Generation and application of correctness-enforced executable filters

Methods of generating filters automatically from data processing jobs are described. In an embodiment, these filters are automatically generated from a compiled version of the data processing job using static analysis which is applied to a high-level representation of the job. The executable filter is arranged to suppress rows and/or columns within the data to which the job is applied and which do not affect the output of the job. The filters are generated by a filter generator and then stored and applied dynamically at a filtering proxy that may be co-located with the storage node that holds the data. In another embodiment, the filtered data may be cached close to a compute node which runs the job and data may be provided to the compute node from the local cache rather than from the filtering proxy.

Method and device for implementing a process under a superuser privilege, and mobile terminal

In an example for implementing a process under a superuser privilege within a computing device, a monitor function library for monitoring an executable function is loaded when the process acquires the superuser privilege. When it is detected that the process runs the executable function, the monitor function library may suspend the running of the executable function, and output process monitoring information. If a feedback to the process monitoring information indicates that it is allowable to perform the executable function, a system function library is invoked to perform the executable function the process runs.

Method and system for providing a pipeline infrastructure
09817694 · 2017-11-14 · ·

Systems and methods for providing a pipeline as a service are provided. An example method includes performing, at the incoming pipeline handler, a first action on a first request. The incoming pipeline handler is part of an incoming pipeline in a first application framework. The method also includes performing, at the incoming pipeline handler, a second action on a second request. The incoming pipeline handler is part of the incoming pipeline in a second application framework.

System and method for application isolation
09769261 · 2017-09-19 · ·

A system, method, and computer readable medium for providing application isolation to one or more applications. The system may include an isolated environment including application files and executables, and an interception layer intercepting access to system resources and interfaces. The system may further include an interception database maintaining mapping between the system resources inside the isolated environment and outside, and a host operating system, wherein the isolated environments are saved on at least one of a local and remote storage.

Synchronous replication for synchronous mirror copy guarantee
11249954 · 2022-02-15 · ·

Techniques are provided for synchronous replication for synchronous mirror copy guarantee. A file system dependent technique for synchronous mirror copy guarantee is provided by overriding default behavior of a persistent fence so that the persistent fence is activated to block operations targeting a storage object having a synchronous replication relationship based upon the synchronous replication relationship being out of sync. The default behavior of the persistent fence is overridden to allow operations to be executed upon the storage object based upon the synchronous replication relationship being in sync. A file system independent technique for synchronous mirror copy guarantee is provided by intercepting operations before the operations are received by a file system. The operations are selectively forwarded to the file system or not based upon a state of a synchronous replication relationship.

Method to support multiple versions of APIs and to control run-time execution of an API

In an approach to API versioning, annotations are provided to differentiate among two or more versions of an API. Statistics associated with the two or more versions of the API are collected. A call from a client to access one of the two or more versions of the API is intercepted. A best-fit version for the client is identified based on employing analytical elements on the collected statistics. API execution is re-routed to the identified best-fit version during run-time.