Patent classifications
G06F9/45
Anticipated prefetching for a parent core in a multi-core chip
Embodiments relate to prefetching data on a chip having a scout core and a parent core coupled to the scout core. The method includes determining that a program executed by the parent core requires content stored in a location remote from the parent core. The method includes sending a fetch table address determined by the parent core to the scout core. The method includes accessing a fetch table that is indicated by the fetch table address by the scout core. The fetch table indicates how many of pieces of content are to be fetched by the scout core and a location of the pieces of content. The method includes based on the fetch table indicating, fetching the pieces of content by the scout core. The method includes returning the fetched pieces of content to the parent core.
Apparatus and program
This apparatus is provided with a storage device and a CPU. The storage device has two or more modules stored therein. The CPU acquires, from the storage device, a first module and a second module from among the modules stored in the storage device. Furthermore, the CPU creates a message that indicates whether a hierarchical structure of the first module matches a hierarchical structure of the second module.
Continuous cloud-scale query optimization and processing
Runtime statistics from the actual performance of operations on a set of data are collected and utilized to dynamically modify the execution plan for processing a set of data. The operations performed are modified to include statistics collection operations, the statistics being tailored to the specific operations being quantified. Optimization policy defines how often optimization is attempted and how much more efficient an execution plan should be to justify transitioning from the current one. Optimization is based on the collected runtime statistics but also takes into account already materialized intermediate data to gain further optimization by avoiding reprocessing.
Network switch, network system, and network control method
A network switch, includes: a port configured to receive a packet from one of a first information processing device and a second information processing device: a processor configured to process the packet, wherein the processor performs operations of: extracting first information which is used for creating a request packet requesting a response of a first virtual machine executed by the first information processing device from the packet which is transmitted by the first virtual machine to a second virtual machine executed by the second information processing device; creating the request packet using the first information; transmitting the request packet to the first virtual machine; and determining an operation state of the first virtual machine based on if a response packet for the request packet is received from the first virtual machine.
Factory identification system
The described technology is directed towards a factory identification system, in which a factory object is provided with a factory identifier (ID) that specifies information regarding a desired object that is more specific than specifying an interface. Additional construction parameters such as an object ID may be provided to further describe the desired object. Also described are object caching and reuse, and tagging the object with information that may be preserved and later used to recreate an object.
Unaligned instruction relocation
In one embodiment, a computer-implemented method includes receiving source code to be compiled into an executable file for an unaligned instruction set architecture (ISA). Aligned assembled code is generated, by a computer processor. The aligned assembled code complies with an aligned ISA and includes aligned processor code for a processor and aligned accelerator code for an accelerator. A first linking pass is performed on the aligned assembled code, including relocating a first relocation target in the aligned accelerator code that refers to a first object outside the aligned accelerator code. Unaligned assembled code is generated in accordance with the unaligned ISA and includes unaligned accelerator code for the accelerator and unaligned processor code for the processor. A second linking pass is performed on the unaligned assembled code, including relocating a second relocation target outside the unaligned accelerator code that refers to an object in the unaligned accelerator code.
Synchronizing settings associated with virtual computing environments
The disclosed embodiments provide a system that operates a computer system. During operation, the system detects a first change in a setting associated with a first computing environment executing on the computer system, wherein the first change is associated with at least one of an input/output (I/O) device setting, a regional setting, a network setting, a power setting, and a display setting. Next, the system propagates the first change to one or more other computing environments executing on the computer system.
Source code element signatures
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating signatures for source code elements. One of the methods includes generating a respective signature for each source code element of the plurality of source code elements, including obtaining a name of the source code element, obtaining one or more of a location of a compilation unit containing the source code element and contents of the compilation unit containing the source code element, and generating the signature including combining a first representation of the name of the source code element and one or more of a second representation of the location of the compilation unit and a third representation of the contents of the compilation unit containing the source code element, wherein at least two of the plurality of source code elements have a same name and different respective signatures.
Application deployment system and method for a computing infrastructure
An application deployment system includes a computing device that stores computing infrastructure (CI) information associated with a computing infrastructure to be deployed in a portable memory structure, wherein the portable memory structure is physically associated with the computing infrastructure to be deployed. When the computing infrastructure is transported to the deployment site, the computing device receives the stored application configuration information from a portable communication device that has previously obtained the stored application configuration information from the portable memory structure, obtains one or more applications to be installed on the computing infrastructure according to the received application configuration information, and transmits the applications to the portable communication device, wherein the portable communication device downloads the applications to the computing infrastructure for being installed on the computing infrastructure.
ANALYSIS DEVICE, ANALYSIS METHOD, AND ANALYSIS PROGRAM
A program analysis unit of a browser emulator manager exhaustively searches a code by performing syntax analysis of a code included in web content to search a transfer code to another site or a content acquisition code, and specifies at least any of an object and a function and a property of the object used in the code found as a result of the search. Further, the program analysis unit extracts a code having a dependence relationship with the transfer code or the content acquisition code based on at least any of the object and the function and the property of the object thus specified.