Patent classifications
G06F9/44594
MULTI-TENANT DATA PROTECTION IN EDGE COMPUTING ENVIRONMENTS
Various approaches for implementing multi-tenant data protection are described. In an edge computing system deployment, a system includes memory and processing circuitry coupled to the memory. The processing circuitry is configured to obtain a workflow execution plan that includes workload metadata defining a plurality of workloads associated with a plurality of edge service instances executing respectively on one or more edge computing devices. The workload metadata is translated to obtain workload configuration information for the plurality of workloads. The workload configuration information identifies a plurality of memory access configurations and service authorizations identifying at least one edge service instance authorized to access one or more of the memory access configurations. The memory is partitioned into a plurality of shared memory regions using the memory access configurations. A memory access request for accessing one of the shared memory regions is processed based on the service authorizations.
STORAGE DEDUPLICATION FOR CONTAINERS WITH ENCRYPTED STORAGE
Technology for enabling a kernel to perform data deduplication on encrypted storage of a container. An example method may involve: enabling, by a kernel, a guest program of a container to access a first storage block of a first container and a second storage block of a second container; receiving, by the kernel from the guest program, an indication that the first storage block and the second storage block are duplicate storage blocks; and updating the first storage block or the second storage block to cause the duplicate storage blocks to reference a common storage location.
Systems and methods for aggregating implicit and explicit event code of executable models
Systems and methods may aggregate and organize implicit and explicit initialization, reset, and termination operations defined throughout the hierarchy of an executable. The systems and methods may analyze the model and identify implicit and explicit initialization, reset, and termination operations defined at various hierarchical levels. The systems and methods may aggregate the implicit and explicit initialization, reset, and termination operations into an initialize callable unit, a reset callable unit, and a termination callable unit. The systems and methods may apply optimizations to the callable units, and resolve conflicts. The systems and methods may define a single entry point for each of the initialize, reset, and termination callable units.
TRANSFER VIA TRANSACTION APP
Systems and methods may generally include sending an executable application, which when executed, automatically causes a monetary transfer. An example method may include performing, at a first user device, a handshake with a second user device, receiving, during the handshake, an operating capability of the second user device, and configuring, based on the operating capability of the second user device, an executable application, which when executed, automatically causes a monetary transfer to occur. The configured executable application may be sent to the second user device for execution.
Auto unload
A system for unloading tables of a database is provided. In some aspects, the system performs operations including determining that a number of accesses to a table occurring within a time period has satisfied an access threshold. The operations may further include identifying, in response to the determining, a first timestamp indicating a most recent access to the table. The operations may further include determining whether a difference between a current timestamp and the first timestamp satisfies a first time threshold. The operations may further include comparing, in response to the difference satisfying the first time threshold, a ratio of the difference and a size of the table to a ratio threshold. The operations may further include unloading, in response to satisfying the ratio threshold, the table. The operations may further include adjusting, based on the feedback, the first time threshold and/or the ratio threshold.
PROGRAM KILLING SYSTEM AND PROGRAM KILLING METHOD
The disclosure discloses a program killing system including a memory and a processor. The processor obtains instructions from the memory to perform the following steps: collecting use counts, use times, and a first use order of programs; generating a first candidate list based on the plurality of use counts and the use times, generating a second candidate list based on the use counts, and generating a third candidate list based on the first use order; collecting a second use order of the programs in an operation time to generate an operation list; comparing each of the first candidate list, the second candidate list, and the third candidate list with the operation list to produce a comparison result; and outputting one of the first candidate list, the second candidate list, or the third candidate list as a judgment list according to the comparison result.
Storage deduplication for virtual machines with encrypted storage
Technology for enabling a hypervisor to perform data deduplication on encrypted storage of a virtual machine. An example method may involve: enabling, by a hypervisor, a guest program to access a first storage block of a first virtual machine and a second storage block of a second virtual machine; receiving, by the hypervisor from the guest program, an indication that the first storage block and the second storage block are duplicate storage blocks; and updating the duplicate storage blocks to reference a common storage location.
Enhanced healing and scalability of cloud environment app instances through continuous instance regeneration
Techniques for refreshing application instances periodically based on a refresh rate parameter, providing enhanced health and stability for instances actively executing workloads. When a workload is received requesting one or more application instance(s), a refresh rate is determined, and the instance(s) are monitored. Periodically, based on the refresh rate, the monitored application instance(s) are refreshed. One or more instance(s) are identified for refreshing, one or more new replacement instance(s) are generated, and the identified instances are removed from active service and decommissioned. Workloads continue execution upon the newly generated instances, which are in turn monitored and refreshed as dictated by the refresh rate.
Scene switching method, device and medium
This application discloses a scene switching method, device and medium. The method includes after having loaded a first Activity interface of an application development project, removing a first scene contained in the first Activity interface in response to an operation of loading a second Activity interface of the application development project loading the second Activity interface and loading the first scene in the second Activity interface, replacing the first scene with a second scene in the second Activity interface, the multiple scenes being provided by a scene development project imported into the application development project, and the first Activity interface and the second Activity interface being developed and obtained by the application development project.
Class unloading method and electronic device
A class unloading method comprises: loading, by an electronic device, n classes after an application is started, where n is a positive integer; generating a reference mapping table, where the reference mapping table includes a reference relationship between the n classes and m class objects corresponding to the n classes and a dependency relationship between the m class objects corresponding to the n classes, the dependency relationship is used to represent an interdependency mapping relationship between different class objects, and m is a positive integer greater than or equal to n; and unloading a first class of the n classes based on the reference mapping table in an operation process of the application.