G06F11/1492

APPARATUS AND METHOD OF CONTROL FLOW INTEGRITY ENFORCEMENT
20210089400 · 2021-03-25 ·

A computer device includes a memory. The computer device also includes at least one processor configured to execute a process and manage the memory for the process. The processor is further configured to execute one or more program instructions associated with an application, reach control flow transfer for the one or more program instructions, unwind a call stack associated with the one or more program instructions in response to a failure to meet a target control flow, identify an offending function call, and rewrite the offending function call. The rewritten function call includes a memory operation boundary check.

ASYNCHRONOUS INPUT AND OUTPUT FOR SNAPSHOTS OF VIRTUAL MACHINES
20210034397 · 2021-02-04 ·

A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.

STREAMING DATABASE CLONING USING CLUSTER LIVE MOUNTS

A database can be instantly cloned from a source device to a target device by a cluster mapped to a database to be cloned. Nodes of the cluster are mapped over channels to directories of the database. Scripts are generated from one or more templates that specify the order and values to be executed to perform a database job, such as cloning the database to the target device using the mappings. To clone the database, a template can be executed that generates and populates scripts, which can be executed on the target device to provide a functioning cloned database using the mapped cluster.

ASYNCHRONOUS INPUT AND OUTPUT FOR SNAPSHOTS OF VIRTUAL MACHINES
20210034396 · 2021-02-04 ·

A data management system comprises: a storage appliance configured to store a snapshot of a virtual machine; and one or more processors in communication with the storage appliance. The one or more processors are configured to perform operations including: identifying a plurality of shards of the virtual machine; requesting a snapshot of each of the plurality of shards; receiving the shards asynchronously; ordering the received snapshot shards sequentially into a results queue; and storing a single snapshot of the virtual machine based on the ordered snapshot shards. Operations may further include maintaining a flow control queue that limits the number of snapshot shards requested.

Application error fingerprinting
10911447 · 2021-02-02 · ·

An application error detection platform computer processor may monitor execution of an application for a customer and determine that an application error has occurred. Responsive to the determination that an application error has occurred, an error fingerprint creation platform computer processor may access a stack trace representing execution of the application when the application error occurred. An error fingerprint associated with the occurrence of the application error may then be determined by applying a hash function (e.g., SHA-1) to information contained in the stack trace. Electronic records including an indication of the error fingerprint may then be received by and stored in an application error log data store. The application error log data store may then be searched for duplicate error fingerprints to facilitate application error resolution.

ERROR RECOVERY FOR CONVERSATIONAL SYSTEMS

A method, comprising recognizing a user utterance for processing. The method further comprises using a previously-trained code-generation machine to generate, from the user utterance, a data-flow program configured to produce a return value upon successful execution. The method further comprises beginning execution of the data-flow program. Responsive to reaching an error condition resulting from execution of the data-flow program, the method further comprises, prior to the data-flow program producing the return value, suspending execution of the data flow program. The method further comprises using the previously-trained code-generation machine to generate an error-handling data-flow program, wherein the error-handling data-flow program is configured to produce the return value; beginning execution of the error-handling data-flow program to produce the return value; and outputting the return value.

Generating context aware consumable instructions

A system, program product, and method for use with an information handling system to detect and resolve faults in a run-time environment. As faults are detected, one or more corresponding general query responses are identified and subject to a ranking based on relevance criteria. At least one modified response is transformed into a command, selectively blended with context, and encoded as a context aware instruction. The instruction is subject to testing with corresponding output being subject to measurement.

Predictive analysis, scheduling and observation system for use with loading multiple files

A method for creating a common platform graphical user interface is provided. The interface may enable a user to trigger a data load job from a tool. The tool may monitor file upload events, trigger jobs and identify lists of missing or problematic file names. The tool may run on a single thread, thereby consuming relatively less system resources than a multi-thread program to perform its capabilities. The tool may enable selection of file names using wildcard variables or keyword variables. The tool may validate a list of files received against a master file list for each data load job. The tool may receive user input relating to each data load job. The tool may generate a loop within the single thread to receive information. The tool may analyze the received information and use the received information to predict future metadata associated with future data load jobs.

Intelligent and automatic replication load score based load balancing and resiliency of replication appliances

Various systems and methods are provided for receiving replication data at a recovery site from a replication process initiated on a primary site, where the recovery site includes at least a first gateway appliance and a second gateway appliance that can be used to process the replication data. The systems and methods further involve evaluating a replication load of the first gateway appliance, which includes analyzing at least a first evaluation factor and a second evaluation factor related to the replication process, and in response to evaluating the evaluation factors, determining whether the first gateway appliance is overloaded. In response to determining that the first gateway appliance is overloaded, rebalancing a replication workload between the first gateway appliance and the second gateway appliance.

Computer-implemented runtime system, healthcare network, method and computer program
11868767 · 2024-01-09 · ·

A computer-implemented runtime system is operable of providing a continuous product execution runtime environment for an application via a healthcare network. The system includes a focus machine and an action plan repository, to provide an autonomous runtime environment by at least: monitoring a running use case of at least one application on at least one device; taking over responsibility of a running use case of the at least one application, upon an error state being detected for the monitored running use case; analyzing the error state of the running use case detected; obtaining at least one suitable substitution action out of a plurality of actions deposited in the action plan repository, based on the error state of the running use case analyzed; and terminating and completing at least a part of the running use case, by employing the at least one substitution actions obtained, on the at least one application.