Patent classifications
G06F9/465
AUTOMATICALLY DETERMINING FLAGS FOR A COMMAND-LINE INTERFACE IN A DISTRIBUTED COMPUTING ENVIRONMENT
Flags for a command-line interface (CLI) can be automatically determined. In one example, a system can receive a user input through the CLI to manipulate an object in a computing environment. The user input can include a flag for setting a customizable parameter of the object to a particular value. The system can also receive definition data specifying one or more customizable parameters for the object. The system can then determine one or more available flags associated with the one or more customizable parameters specified in the definition data, where the available flag(s) are usable for configuring the one or more customizable parameters of the object. Based on the available flag(s), the system can determine if the flag in the user input is valid. If so, the system can manipulate the object in the computing environment such that the manipulated object has the particular value for the customizable parameter.
Methods and systems for service discovery and tunneling in a distributed architecture
A method for distributed service management includes; running, by client nodes and service provider nodes, respective instances of a distributed service management unit, wherein the distributed service management unit comprises a distributed hash set table (DHST); providing, by the distributed service management unit, an application programming interface (API), wherein all connections between a client node and a service provider node are tunneled through the API; registering, by a service provider, a service on a network node; storing, by the registering network node, an endpoint of the service in a dataset of the DHST with a key corresponding to the service; requesting, by the client node, the service; and returning, by the distributed service management unit, all endpoints stored in the DHST with the key corresponding to the service.
VASCULAR TREATMENT DEVICES AND ASSOCIATED SYSTEMS AND METHODS OF USE
The present technology relates to devices for treating arteries. In several embodiments, for example, the present technology comprises an expandable structure configured to be intravascularly positioned within a lumen of the artery at a treatment site, where the artery has a substantially circular cross-sectional shape at the treatment site prior to deployment of the expandable structure therein. When the expandable structure is in an expanded state and positioned in apposition with the arterial wall at the treatment site under diastolic pressure, the expandable structure may force the artery into a non-circular cross-sectional shape. A cross-sectional area of the artery in the non-circular cross-sectional shape may be less than a cross-sectional area of the artery in the substantially circular cross-sectional shape.
Encryption of application data using field-level metadata
Techniques are provided for identifying and encrypting fields of an application object at an application layer in a multi-tenant cloud architecture, using an object metadata structure of the application object. Accordingly, transparent, per-tenant encryption capabilities are provided, while enabling transfer of encrypted object data between the application layer and a storage layer.
Distributed standards registry for cloud computing environments
Techniques for providing a distributed standards registry are provided. A DSR system may include a plurality of distributed standards registry participants that are collectively configured to provide control logic for the distributed standards registry using a consensus voting mechanism to make control decisions. The DSR system includes include a distributed ontology model library maintained on the plurality of distributed standards registry participants and storing a plurality of ontology models, and a distributed federation broker registry maintained across the plurality of distributed standards registry participants. A first distributed standards registry participant of the plurality of distributed standards registry participants includes a discovery processor operable to receive and process federation participant queries and a registry processor operable to receive and process registration requests to register the federation broker as providing brokerage services related to a federation service described by one of the plurality of ontology models.
Method for controlling execution of heterogeneous operating systems and electronic device and storage medium therefor
An electronic device is provided. The electronic device includes a display, at least one processor, and a memory operatively connected with the display and the at least one processor and configured to store a plurality of applications including a first application configured to execute using a first operating system (OS) and a second application configured to execute using a second OS, wherein the memory stores instructions configured to, when executed, cause the at least one processor to output a first object and a second object on a screen of the first OS, wherein the first object is associated with execution of the first application and the second object is associated with execution of the second application and, when the second object is selected, output an execution screen of the second application on the screen of the first OS. Other embodiments are also possible.
Techniques for collective operations in distributed systems
Various embodiments are generally directed to techniques for collective operations among compute nodes in a distributed processing set, such as by utilizing ring sets and local sets of the distributed processing set. In some embodiments, a ring set may include a subset of the distributed processing set in which each compute node is connected to a network with a separate router. In various embodiments, a local set may include a subset of the distributed processing set in which each compute node is connected to a network with a common router. In one or more embodiments, each compute node in a distributed processing set may belong to one ring set and one local set.
Adaptive synchronization for redo writing to persistent memory storage
A computer's processes and/or threads generate and store in memory, data to reimplement or reverse a transaction on a database, so that the database can be recovered. This data is written to persistent memory storage (“persisted”) by another process, for which the processes and/or threads may wait. This wait includes at least a sleep phase, and additionally a spin phase which is entered if after awakening from sleep and checking (“on-awakening” check), the data to be persisted is found to not have been persisted. To sleep in the sleep phase, each process/thread specifies a sleep duration determined based at least partially on previous results of on-awakening checks. The previous results in which to-be-persisted data was found to be not persisted are indications the sleeps were insufficient, and these indications are counted and used to determine the sleep duration. Repeated determination of sleep duration makes the sleep phase adaptive.
FAULT-TOLERANT AND HIGHLY AVAILABLE CONFIGURATION OF DISTRIBUTED SERVICES
A computer-implemented method comprises detecting, by a processor of a first host of one or more hosts in a distributed computing environment, a distributed task waiting to be started, from a replicated configuration system, the distributed task being represented by a pending tasks key. The method comprises starting, by the processor, the distributed task by performing an atomic compare and swap operation to add a started key to the replicated configuration system. The method also comprises writing a specification of the distributed task to the replicated configuration system under a new version of a current tasks key. In addition, the method comprises removing, following the writing, the pending tasks key from the replicated configuration system.
DATA AMALGAMATION MANAGEMENT BETWEEN MULTIPLE DIGITAL PERSONAL ASSISTANTS
The present invention may have a computer that monitors conversation between a user and a first virtual assistant from a plurality of virtual assistants, for a confidence score value being below a confidence threshold value, where the confidence score value is associated with each answer of the first virtual assistant. When the computer determines the confidence score value is below the confidence threshold value, the computer generates a dialog flow for answering by a second virtual assistant, where the dialog flow is related to an answer associated with the confidence score value being below the confidence threshold value. Then, based on determining the second virtual assistant having a second confidence score value that is higher than the confidence score value, the computer transfers a knowledge base data of a topic associated with the dialog flow from the first virtual assistant to the second virtual assistant.