G06F9/449

USER EXIT DAEMON FOR USE WITH SPECIAL-PURPOSE PROCESSOR, MAINFRAME INCLUDING USER EXIT DAEMON, AND ASSOCIATED METHODS
20220382528 · 2022-12-01 ·

Certain example embodiments relate to techniques for use with mainframe computing systems that include both general-purpose processors (e.g., CPs) and special-purpose processors that can be used to perform only certain limited operations (e.g., zIIPs). Certain example embodiments automatically help these special-purpose processors perform user exits and other routines thereon, rather than requiring those operations to be performed on general-purpose processors. This approach advantageously can improve system performance when executing programs including these user exits and other routines, and in a preferred embodiment, it can be accomplished in connection with a suitably-configured user exit daemon. In a preferred embodiment, the daemon and its clients can use a user exit property table or the like to communicate with one another about the state of each user exit or other routine that has been analyzed, classified, and possibly modified.

Estimating indirect interface implementation before load time based on directly implemented methods

According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to receive a first class, the first class indirectly implementing a first interface, wherein the first class extends a second class that directly implements the first interface, identify one or more directly implemented methods within the first class, determine a method signature for one or more of the directly implemented methods, estimate that the first class indirectly implements the first interface based on the method signatures for the one or more directly implemented methods, and instrument the first class based on the estimating that the first class indirectly implements the first interface.

SECURELY CONNECTING ISOLATED MANAGED HEAPS

A method may include generating, by a source isolate, an external object reference, passing, by the source isolate, the external object reference to a target isolate, storing, by the source isolate and in an exported reference table, an entry that maps the external object reference to an object stored in a heap of the source isolate, performing, by the target isolate, a task that accesses the object using the external object reference, receiving, by the source isolate and from a finalizer of the external object reference, a notification that the external object reference has become unreferenced, and in response to the notification, removing, by the source isolate, the entry from the exported reference table.

Accessing a migrated member in an updated type

Techniques for accessing a migrated method include: identifying a request to invoke a method defined by a type, the request including one or more arguments associated with respective argument types; identifying, in the type, an older version of the method associated with (a) a method name and (b) a first set of one or more parameter types, and a current version of the method associated with (a) the method name and (b) a second set of one or more parameter types; determining that the argument type(s) match(es) the first set of one or more parameter types; responsive to determining that the argument type(s) match(es) the first set of one or more parameter types: applying one or more conversion functions to convert the argument(s) to the second set of one or more parameter types; executing the current version of the method using the converted argument(s).

Dynamic generation of cloud platform application programming interface calls
11630705 · 2023-04-18 · ·

An apparatus comprises a processing device configured to receive a request to execute an action on cloud assets of a cloud platform utilizing an application programming interface (API) exposed by the cloud platform, the request comprising a set of keyword arguments, and to generate a code class instance for the API. The processing device is also configured to instantiate, via the generated code class instance, a client for the cloud platform utilizing a first subset of arguments in the set of keyword arguments, to determine from the set of keyword arguments an identifier of the action to be executed, and to execute the action by running a function of the generated code class instance, the function dynamically generating an API call utilizing the instantiated client for the cloud platform, the determined identifier, and a second subset of arguments in the set of keyword arguments.

GENERIC FACTORY CLASS
20230110270 · 2023-04-13 ·

Systems and methods provide a generic factory class to determine one or more classes implementing an interface and/or derived from a base class in response to a call from an application factory class by retrieving a list of the one or more classes implementing the interface or derived from the based class, determining properties of each of the one or more classes, and return, based on the properties, a name of each of one or more of the one or more classes.

SYSTEMS AND METHODS FOR IMPLEMENTING A SHIM DATABASE DRIVER

Disclosed are some implementations of systems, apparatus, methods and computer program products for implementing a shim driver configurable to provide a database driver. A shim driver class is loaded from a class path and instantiated such that a shim driver is generated. A directory path and database driver class name are obtained from a configuration file. An application transmits a request for a database driver via an application programming interface (API) of the shim driver, where the request includes the directory path and database driver class name. The shim driver loads a database driver class identified by the database driver class name using the directory path, instantiates the database driver class such that a first database driver is generated, and provides the first database driver responsive to the request.

Dynamically replacing a call to a software library with a call to an accelerator

A computer program includes calls to a software library. A virtual function table is built that includes the calls to the software library in the computer program. A programmable device includes one or more currently-implemented accelerators. The available accelerators that are currently-implemented are determined. The calls in the software library that correspond to a currently-implemented accelerator are determined. One or more calls to the software library in the virtual function table are replaced with one or more corresponding calls to a corresponding currently-implemented accelerator. When a call in the software library could be implemented in a new accelerator, an accelerator image for the new accelerator is dynamically generated. The accelerator image is then deployed to create the new accelerator. One or more calls to the software library in the virtual function table are replaced with one or more corresponding calls to the new accelerator.

EXTENSION PROPERTY CALLS
20230153075 · 2023-05-18 ·

In programming environments, an object can be extended by adding a new property (subroutine) to the collection of the object properties. The properties of the object can be accessed using property access syntax. Extension property call is an innovation which allows the use of an object together with property access expression to access the properties (subroutines) that are not contained in the object itself, but which are contained in another object and are visible in the scope where the property access expression is used. The extension properties do not have special extension property definition syntax. Any regular property (subroutine) can be used as the extension property of the object if the property is visible in the scope where the property access expression is used. Extension property calls makes programming language code concise, improving code readability.

PREDICTIVE OPTIMIZATION OF NEXT TASK THROUGH ASSET REUSE

A first category is determined of a first task being performed at a given time. A first asset that is configured for use with the first category is identified. A next task object is constructed. By analyzing a set of tasks that were performed during a period prior to the given time, a candidate next task is identified. The candidate next task has been performed sometime after a previous performance of the first task during the period. From the first asset, a link to a second asset is selected. The second asset is configured for use with a second category of the candidate next task. The next task object is populated with the link. The candidate next task is designated as a second task that will occur sometime after the first task.