G06F11/1482

REMOTE KEYBOARD-VIDEO-MOUSE TECHNOLOGIES
20170353347 · 2017-12-07 ·

Technologies for remote keyboard-video-mouse sessions can include failover mechanisms. In some embodiments, a system can establish a first remote keyboard-video-mouse session between a console application on the system and a first server application executed by a controller on a server. The first remote keyboard-video-mouse session can be established via a first network connection between the system and the controller. Next, the system can detect an error associated with the first remote keyboard-video-mouse session. In response to the error, the system can establish a second remote keyboard-video-mouse session between the console application and a second server application executed by an operating or a basic input/output program on the server. The second remote keyboard-video-mouse session can be established via a second network connection between the system and the second server application.

Transparent checkpointing and process migration in a distributed system

A distributed system for creating a checkpoint for a plurality of processes running on the distributed system. The distributed system includes a plurality of compute nodes with an operating system executing on each compute node. A checkpoint library resides at the user level on each of the compute nodes, and the checkpoint library is transparent to the operating system residing on the same compute node and to the other compute nodes. Each checkpoint library uses a windowed messaging logging protocol for checkpointing of the distributed system. Processes participating in a distributed computation on the distributed system may be migrated from one compute node to another compute node in the distributed system by re-mapping of hardware addresses using the checkpoint library.

System and method for analyzing data records

A method processes data records. The method partitions the data records into groups and assigns each group to a respective process of a first plurality of processes, which execute in parallel. For each group, the assigned process extracts information from the data records, applies a script with information processing commands applied sequentially to produce intermediate values, stores the intermediate values in a respective intermediate data structure, and updates the status of the group to indicate completion. When the predefined threshold percentage of the data records are completed, the process assigns each group to a respective second process as a backup. When each of the groups has been completed by at least one process (either the original or the backup), the method executes a second plurality of processes to aggregate intermediate values from the intermediate data structures to produce output data. The aggregation includes intermediate values only once for each group.

Workflows for automated operations management
11507462 · 2022-11-22 · ·

Techniques are disclosed relating to automated operations management. In various embodiments, a computer system accesses operational information that defines commands for an operational scenario and accesses blueprints that describe operational entities in a target computer environment related to the operational scenario. The computer system implements the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules that include an orchestrator controller module at a top level of the hierarchy that is executable to carry out the commands by issuing instructions to controller modules at a next level. The controller modules may be executable to manage the operational entities according to the blueprints to complete the operational scenario. In various embodiments, the computer system includes additional features such as an application programming interface (API), a remote routing engine, a workflow engine, a reasoning engine, a security engine, and a testing engine.

Method and system for providing coordinated checkpointing to a group of independent computer applications

A system and method thereof for performing loss-less migration of an application group. In an exemplary embodiment, the system may include a high-availability services module structured for execution in conjunction with an operating system, and one or more computer nodes of a distributed system upon which at least one independent application can be executed upon. The high-availability services module may be structured to be executable on the one or more computer nodes for loss-less migration of the one or more independent applications, and is operable to perform checkpointing of all state in a transport connection.

AUTOMATED QUERY RETRY USING A DATABASE PLATFORM

Automated query retry includes selecting a first node of a plurality of nodes of an execution platform in response to a query. The first node is configured with a first version of a database platform. A first execution of the query is performed using the first version of the database platform at the first node. The method further includes detecting the first execution results in a failed execution. A second execution of the query is scheduled. The second execution uses at least one of the first version of the database platform or a second version of the database platform configured at a second node of the plurality of nodes. The second version is released after the first version. A cause of the failed execution of the query at the first node is determined based at least in part on a result of the second execution of the query.

Managing a data analytics pipeline

Providing for high availability in a data analytics pipeline without replicas, including: creating a data analytics pipeline, wherein each component of the data analytics pipeline is deployed within a container; creating a failover container; detecting that a component within the data analytics pipeline has failed; and responsive to detecting that the component within the data analytics pipeline has failed, deploying the component within the data analytics pipeline that has failed in the failover container.

Method and system for providing coordinated checkpointing to a group of independent computer applications

A method and system of checkpointing single process application groups and multi-process application groups. In an exemplary embodiment, the method may include creating at least one full checkpoint for each application in an application group, and creating at least one incremental application checkpoint for each application in the application group. Further, each of the at least one incremental application checkpoint may be automatically merged against a corresponding full application checkpoint. Further, checkpointing may be synchronized across all applications in the application group. In the exemplary embodiment, each application may use both fork( ) and exec( ) in any combination.

Pool of devices providing operating system redundancy

Systems, methods, and computer program products for providing operating system (O/S) redundancy in a computing system are provided. One system includes a host computing device, a plurality of memory devices, and a sub-loader coupled between the host computing device and the plurality of memory devices. Each memory device stores a respective O/S and the sub-loader is configured such that the plurality of memory devices appear transparent to the host computing device. One method includes designating, a first logical unit device as a primary logical unit device and subsequently determining that the first logical unit device is unresponsive. The designation is removed from the first logical unit device and a second logical unit device is designated as a new primary logical unit device. One computer program product includes instructions for performing the above method.

Query-attempt processing in a database environment

Disclosed herein are embodiments of systems and methods for query-attempt processing in a database environment. In an embodiment, a database platform receives a query, and operates a first query manager of the database platform to manage a first attempt to execute the query. Based on determining that the attempt to execute the query was unsuccessful, the database platform identifies a second query manager of the database platform as implementing a same version of the database platform as the first query manager, and operates the second query manager to manage a first retry attempt to execute the query.