Patent classifications
G06F9/45504
Processing apparatus, processing method, and computer program product for controlling timing of data accessing to a memory
According to an embodiment, a processing apparatus includes a memory and a processor coupled to the memory. The processor is configured to: execute data access that is at least one of data writing to the memory and data reading from the memory; receive access control information for controlling timing of the data access to be executed; and control the timing of the data access based on the received access control information.
Systems and methods for recommending optimized virtual-machine configurations
An example method is provided for recommending VM configurations, including one or more servers upon which one or more VMs can run. A user wishing to run these VMs can request a recommendation for an appropriate server or set of servers. The user can indicate a category corresponding to the type of workload that pertains to the VMs. The system can receive the request and identify a pool of servers available to the user. Using industry specifications and benchmarks, the system can classify the available servers into multiple categories. Within those categories, similar servers can be clustered and then ranked based on their levels of optimization. The sorted results can be displayed to the user, who can select a particular server (or group of servers) and customize the deployment as needed. This process allows a user to identify and select an optimized setup quickly and accurately.
Implementing a type restriction that restricts to a non-polymorphic layout type or a maximum value
A type restriction contextually modifies an existing type descriptor. The type restriction is imposed on a data structure to restrict the values that are assumable by the data structure. The type restriction does not cancel or otherwise override the effect of the existing type descriptor on the data structure. Rather the type restriction may declare that a value of the data structure's type is forbidden for the data structure. Additionally or alternatively, the type restriction may declare that an element count allowable for a data structure's type is forbidden for the data structure. Type restriction allows optionality (where only a singleton value for a data structure is allowed), empty sets (where no value for a data structure is allowed), and multiplicity (where only a limited element count for a data structure) to be injected into a code set independent of data type. Type restriction allows certain optimizations to be performed.
Analytic model execution engine with instrumentation for granular performance analysis for metrics and diagnostics for troubleshooting
At an interface an analytic model for processing data is received. The analytic model is inspected to determine a language, an action, an input type, and an output type. A virtualized execution environment is generated for an analytic engine that includes executable code to implement the analytic model for processing an input data stream.
System and method for securely connecting to a peripheral device
A device connectable between a host computer and a computer peripheral over a standard bus interface is disclosed, used to improve security, and to detect and prevent malware operation. Messages passing between the host computer and the computer peripherals are intercepted and analyzed based on pre-configured criteria, and legitimate messages transparently pass through the device, while suspected messages are blocked. The device communicates with the host computer and the computer peripheral using proprietary or industry standard protocol or bus, which may be based on a point-to-point serial communication such as USB or SATA. The messages may be stored in the device for future analysis, and may be blocked based on current or past analysis of the messages. The device may serve as a VPN client and securely communicate with a VPN server using the host Internet connection.
SYSTEM AND METHOD FOR AN ESTIMATION OF APPLICATION UPGRADES USING A DEVICE EMULATION SYSTEM OF A CUSTOMER ENVIRONMENT
A method for managing a client environment includes obtaining, by a device emulation orchestration engine in an emulation system, an upgrade estimation time request associated with an application upgrade, in response to the upgrade estimation time request: performing a device emulation container analysis to determine a client device that requires the application upgrade, wherein the client device executes in the client environment, initiating an upgrade emulation using a device emulation container corresponding to the client device, obtaining, from a device emulation agent executing in the device emulation container, an upgrade estimation, and providing the upgrade estimation to the application upgrade monitoring agent.
Systems and methods for controlling machine operations within a multi-dimensional memory space
Systems and methods for controlling machine operations are provided. A number of data entries are organized into a stack. Each data entry includes a type, a flag, a length, and a value or pointer entry. For each data entry in the stack, the type of data is determined from the type entry, the presence of an address or value is determined by the respective flag entry, and a length of the address or value is determined from the respective length entry. The data to be utilized or an address for the same at a particular electronic storage area is provided at the respective value or pointer entry, which may be specified by a space definition pushed onto the stack.
SYSTEM AND METHODS FOR INPUT/OUTPUT DEVICE EMULATION
A system is disclosed for Input/Output (I/O) device emulation that allows a service provider to configure and enforce a policy for software access to some or all I/O resources in a platform. I/O device emulation enables service providers to protect their platforms from malicious guest software that may be executed on associated platforms that has direct access to I/O resources in case of bare-metal servers, escalates the privilege level from guest to host in case of hosted-Virtual Machine servers, or escalates the privilege level from guest to System Management Mode in case of either bare-metal servers or hosted-Virtual Machine servers. The technology enables service providers to protect their platforms from malicious guest software running on their platforms that either has direct access to legacy I/O and memory mapped I/O resources. In one illustrative example, the platform may include a microprocessor.
Self-healing architecture for resilient computing services
For each respective virtual machine (VM) of a plurality of VMs, a distributed computing system generates a unique Application Binary Interface (ABI) for an operating system for the respective VM, compiles a software application to use the unique ABI, and installs the operating system and the compiled software application on the respective VM. A dispatcher node dispatches, to one or more VMs of the plurality of VMs that provide a service and are in the active mode, request messages for the service. Furthermore, a first host device may determine, in response to software in the first VM invoking a system call in a manner inconsistent with the unique ABI for the operating system of the first VM, that a failover event has occurred. Responsive to the failover event, the distributed computing system fails over from the first VM to a second VM.
Estimating indirect interface implementation before load time based on directly implemented methods
According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.