G06F11/1492

Collaborative information source recovery

Systems and methods of recovering a shared information source can involve identifying a first user of a shared information source in response to detection of a data loss with respect to the shared information source. One or more additional users of the shared information source may be identified based on data associated with the first user. Additionally, the shared information source can be recovered based at least in part on data associated with the one or more additional users.

Software compilation for networked processing system

A compilation technique is provided. The technique includes including a first instruction into a first executable for a first auxiliary processor, wherein the first instruction specifies execution by the first auxiliary processor; and including a second instruction into the first executable, wherein the second instruction targets resources that have affinity with the first auxiliary processor.

INFORMATION PROCESSING METHOD AND INFORMATION PROCESSING APPARATUS
20170068603 · 2017-03-09 ·

Upon executing a job net including a plurality of jobs to be executed in parallel using a shared file, a shared file determination unit determines whether a file used by the jobs is a shared file, a checkpoint management unit sets a checkpoint when the job writes data into a file that was determined to be a shared file, a file copy processing unit creates a replication of the shared file used by the jobs, a process copy processing unit creates a replication of a process of the jobs, and a job execution control unit determines, upon detecting an abnormal state in an active job, a checkpoint from where processing of the job is to be resumed, and resumes the job by using the replication of the shared file and the replication of the process which were created when the checkpoint was set.

Checkpointing systems and methods using data forwarding

In one aspect, the invention relates to a fault tolerant computing system. The system includes a primary virtual machine and a secondary virtual machine, wherein the primary and secondary virtual machines are in communication, wherein the primary virtual machine comprises a first checkpointing engine and a first network interface, wherein the secondary virtual machine comprises a second network interface, wherein the first checkpointing engine forwards a page of memory of the primary virtual machine to the second virtual machine such that the first checkpointing engine can checkpoint the page of memory without pausing the primary virtual machine.

METHOD FOR PERFORMING FAILSAFE CALCULATIONS
20170031786 · 2017-02-02 · ·

A method and device for performing failsafe computation, and a method of compiling code to perform a failsafe computation are provided. The method includes performing a first calculation (212) to generate a first result (214). A second calculation (218) is performed using a scalar (216) and the first calculation (212) to generate a second result (220). The second calculation (218) includes multiplying the first calculation (212) by the scalar (216) to generate a scaled result, and dividing the scaled result by the scalar (216) to generate the second result (220). The first result (214) and the second result (220) are compared to determine if they are equivalent.

RESTORATION OF SYSTEM STATES IN DATA PROCESSING SYSTEMS
20250238341 · 2025-07-24 ·

Methods and systems for managing data processing systems are disclosed. The data processing systems may be managed by restoring the system states in the data processing systems. The system states may be restored in the data processing systems by remediating configurations and/or processes after incidents are resolved. The configurations and/or processes may be changed by remediation of incidents in data processing systems. Restoration of a system state to a goal state may require implementation of action items in the data processing system. The action items that yield restoration of the system state may be stored in a repository for future use.

System and method supporting highly-available replicated computing applications using deterministic virtual machines
12511148 · 2025-12-30 · ·

A method includes executing replicated virtual machines on multiple computing nodes within a cluster in a distributed computing network. Each virtual machine includes an application, and the application includes bytecode. The method also includes sequentially recording, in a replicated transaction log, transactions of the virtual machines and one or more upgrades to the bytecode. The method further includes generating, for each computing node, one or more snapshots and truncating the transaction log. Each snapshot captures an application state and the bytecode of the associated virtual machine. In addition, the method includes, in response to restoration of at least one computing node in the cluster or an addition of at least one additional computing node to the cluster, restoring one or more virtual machines to a current application state of one or more other virtual machines using the transaction log and at least one of the one or more snapshots.

Restoration of system states in data processing systems

Methods and systems for managing data processing systems are disclosed. The data processing systems may be managed by restoring the system states in the data processing systems. The system states may be restored in the data processing systems by remediating configurations and/or processes after incidents are resolved. The configurations and/or processes may be changed by remediation of incidents in data processing systems. Restoration of a system state to a goal state may require implementation of action items in the data processing system. The action items that yield restoration of the system state may be stored in a repository for future use.

Restoration of system states in data processing systems

Methods and systems for managing data processing systems are disclosed. The data processing systems may be managed by restoring the system states in the data processing systems. The system states may be restored in the data processing systems by remediating configurations and/or processes after incidents are resolved. The configurations and/or processes may be changed by remediation of incidents in data processing systems. Restoration of a system state to a goal state may require implementation of action items in the data processing system. The action items that yield restoration of the system state may be stored in a repository for future use.