G06F9/4552

AOT Compiler For A Legacy Game
20230034289 · 2023-02-02 ·

A method for ahead of time (AoT) compiling during a play of a legacy game is provided. The method includes scanning a memory device for an executable code of the legacy game, decoding the executable code, and translating the executable code into a first source code. The method further includes compiling the first source code to output a first compiled code, determining whether a user input during the play of the legacy game is received, and determining whether a fiber for servicing the user input is created. The fiber provides directionality of execution between the first compiled code and a second compiled code. The method includes executing the fiber in response to determining that the fiber for servicing the user input is created. The fiber is executed to generate one or more image frames of the legacy game.

Multiformat data generation for neural network
11494208 · 2022-11-08 ·

Disclosed are systems and methods for efficiently processing artificial intelligence networks. In some embodiments, a just-in-time (JIT) compiler can determine an efficient input data format for a second kernel or microkernel, which is to digest the output of a first kernel or microkernel. The JIT compiler can generate the first kernel or microkernel with an embedded postprocessor, which can dynamically generate a data structure in the efficient data format as the first kernel or microkernel generates its output. The embedded postprocessor can receive the output stream of the first kernel, individually or in portions and can dynamically populate a data structure in the determined efficient data format to be digested by the second kernel or microkernel.

Controlling just in time access to a cluster
11494509 · 2022-11-08 · ·

Examples include a system and computer-implemented method to receive a notification from an application programming interface (API) of creation of a just in time (JIT) grant, the JIT grant defining a request for a user to be authorized to access a cluster according to a JIT policy; determine if access to the cluster by the user is authorized according to the JIT policy; grant access to the user to the cluster when access is authorized according to the JIT policy; and send a notification to the API that access by the user to the cluster is granted.

PROCESS ASSEMBLY LINE WITH ROBOTIC PROCESS AUTOMATION
20230033945 · 2023-02-02 ·

In an example embodiment, a novel “process assembly line” solution is provided that organizes software robots in a manner that, once configured, allows them to be duplicated and cloned into multiple scenarios, including in organizational structures where one software robot is triggered or called by another software robot. Instead of designing software robots with multiple functionalities in each to perform complex situations, the process assembly line can utilize software robots with single functions. This aids developers in building robust software robots and reduces potential errors.

Systems and methods of migrating client information

The present disclosure relates to linking processing codes between platforms, and more particularly, to automatically record linking processing codes between platforms and methods of use. The method includes: obtaining a legacy processing code from a legacy system; obtaining a virtual code from a virtual entry table (VET) which corresponds with the legacy processing code; and mapping the legacy processing code to a target processing code using the virtual code from the VET.

Optimized Software Delivery To Airgapped Robotic Process Automation (RPA) Hosts
20230034658 · 2023-02-02 ·

Some embodiments address unique challenges of provisioning RPA software to airgapped hosts, and in particular, provisioning RPA machine learning components and training corpora of substantial size, and provisioning to multiple airgapped hosts having distinct hardware and/or software specifications. To reduce costs associated with data traffic and manipulation, some embodiments bundle together multiple RPA components and/or training corpora into an aggregate package comprising a deduplicated collection of software libraries. Individual RPA components are then automatically reconstructed from the aggregate package and distributed to airgapped hosts.

COMPUTER-READABLE RECORDING MEDIUM STORING TRANSLATION PROGRAM AND TRANSLATION METHOD
20230030788 · 2023-02-02 · ·

A recording medium stores a program for causing a computer to execute processing including: incrementing a counter every time translating a CISC instruction into a RISC instruction; updating previously referenced translation timing of a register to be used for translation with a value of the counter; in a case where a use register number that stores a register number to be used for translation of the memory operand is an initial value, selecting the register number, and updating the use register number to the selected register number; in a case where the use register number is not the initial value, and when the use register number is not used, skipping data restoration and data saving for the register of the use register number, and generating an instruction to read data of the memory operand by using the register; and generating the RISC instruction equivalent to the CISC instruction.

AUTOMATIC PERFORMANCE TELEMETRY
20220350725 · 2022-11-03 ·

The disclosed techniques assist in diagnosing performance problems of a software application. A profiling module dynamically instruments the application at runtime by intercepting a request to compile one of the application's functions and augmenting the function with performance measuring code. This way, instrumentation is installed without recompiling the application. The execution time of a synchronous function is tracked by adding a local variable that stores function entry time, and by inserting code at each function exit point that computes the elapsed time. The execution time of an async function that executes across multiple threads is measured by repurposing a state machine value to also store the initial function entry time. Instrumented functions that are executed at a rate exceeding a threshold are un-instrumented to avoid self-inflicted performance problems. Function invocations associated with a particular activity, such as responding to a particular web request, may be correlated.

Intelligently determining a virtual machine configuration during runtime based on garbage collection characteristics

Techniques for determining a virtual machine configuration based on garbage collection characteristics are disclosed. GC characteristics associated with GC cycles executed on a memory allocated for execution of an application are obtained. A relationship between GC variables is determined based on the GC characteristics collected over a time period of interest. A target GC characteristic is input to the GC variable relationship to determine an expected GC characteristic. The target GC characteristic may be, for example, a target cumulative pause time per a time interval. A virtual machine configuration is determined based on the expected GC characteristic. The virtual machine configuration is applied to a virtual machine executing the application.

Controller for bridging database architectures

A method of bridging a first database and a second database. The method includes maintaining a state machine representing a state of a virtual node in the first database, wherein the state of the virtual node conforms to a native protocol for native nodes of the first database, said native protocol of the first database differing from a foreign protocol of the second database. The method further includes receiving an incoming message for the virtual node from one of the native nodes according to the native protocol, and based on the incoming message, accessing the second database. The method further includes updating the state of the virtual node based on the incoming message according to the native protocol, and based on the state of the virtual node as updated, sending an outgoing message to one or more of the native nodes according to the native protocol.