09th week of 2013 patent applcation highlights part 50 |
Patent application number | Title | Published |
20130055195 | SYSTEM AND METHOD FOR ITERATIVE GENERATING AND TESTING OF APPLICATION CODE - A method begins by generating application system state transitions from inputted requirements and parameters. For a current implementation of generating application code, the method continues by entering a loop. The loop begins by generating a current intermediate result based on a previous implementation and in accordance with current application code development factors. The loop continues by generating at least one test case based on the one or more of the application system state transitions. The loop continues by testing the current intermediate result in accordance with the at least one test case. When the testing is unfavorable, the loop continues by modifying one or more of: the one or more of the plurality of application system state transitions, the one or more of the parameters, and the one or more implementation tools. The loop then continues by repeating the loop using the modified current application code development factors. | 2013-02-28 |
20130055196 | GENERATING PLC CODE FROM CAD MODELS - Product data management systems, methods, and mediums. A method includes receiving a functional model, and identifying a plurality of elements of the functional model. Each element corresponds to one or more machine operations. The method includes identifying concurrencies between elements to determine at least one set of elements. The method includes creating an execution thread for each of the sets of elements. The method can include generating a rule-based programmable logic controller (PLC) program corresponding to the functional model, based on the execution threads. | 2013-02-28 |
20130055197 | MODELING AND CODE GENERATION FOR SQL-BASED DATA TRANSFORMATIONS - System, method and computer program product for modeling and code generation for SQL-based data transformations. A selection, by a user, of a component to include in a visual representation of a data transformation model (DTM) is received. Logic corresponding to the selected component is arranged in the DTM, wherein the selected component and the logic are compatible with a plurality of implementations of SQL. SQL code corresponding to the logic is generated, wherein the generated SQL code is specific to a selected one of the plurality of SQL implementations. Responsive to the selection, the generated SQL code is provided for rendering in association with the visual representation of the DTM including the selected component. | 2013-02-28 |
20130055198 | SYSTEM AND METHOD FOR GENERATING APPLICATION CODE - A system includes a requirements unit, an implementation unit, and a testing unit. The requirements unit generates application requirements from inputted requirements and parameters and output them in accordance with a system communication protocol. The implementation unit generates application code based on the application requirements, the parameters, and feedback and outputs the application code in accordance with the system communication protocol. The testing unit tests the application code based on the application requirements and the parameters to produce the feedback. | 2013-02-28 |
20130055199 | APPLICATION PLATFORM FOR DESIGNING AND EXECUTING APPLICATIONS - A computer-usable storage medium having instructions embodied therein that when executed cause a computer system to perform a method for using an application platform for designing an application. An interface for developing an application is provided at a computer system. A plurality of components are provided at the interface for use in visually designing the application. A selection of a component from the plurality of components is received at the interface. A placement of the component in the application is received within the interface. The application is compiled with the component and the placement of the component such that the application executes natively on a target processor, and wherein the application is bound directly to a native graphics library associated with the target processor. | 2013-02-28 |
20130055200 | APPLICATION INTERFACE FOR OBJECT BUILD INFORMATION - The formulation of an application object in a memory of a computing system. A system level of the computing system determines that an application object is to be created, but also determines that at least part of the object build information to be used to create the application object is available at an application running on the computing system. The system then interfaces with the application through an interface to cause the application object to be created in the memory using the object build information that is available at the application. As an example, the system level may be parsing a hierarchically structured document that defines various objects of a program. | 2013-02-28 |
20130055201 | CUSTOM APPLICATION CREATION IN MULTI-TENANT SYSTEMS - Methods and systems are provided for creating custom applications that integrate custom objects in a multi-tenant system. One exemplary method for creating a custom application involves an application server providing a graphical user interface on a client device. The graphical user interface includes a graphical user interface element for receiving an input value for an attribute of the custom application, wherein the application server generates the custom application having the attribute equal to the input value indicated by the graphical user interface element to a client device. | 2013-02-28 |
20130055202 | IDENTIFYING COMPONENTS OF A BUNDLED SOFTWARE PRODUCT - A method for identifying software components of a software product comprises establishing, by a computer, data representative of at least one of an attribute and an action of at least one of a first software component in a computer system and a second software component in the computer system, establishing a first confidence value indicative of a likelihood that the first software component belongs to the software product, establishing, based on the data, a second confidence value indicative of a likelihood that the first software component and the second software component are software components of a common software product, and establishing, based on the first and second confidence values, a third confidence value indicative of a likelihood that the second software component belongs to the software product. | 2013-02-28 |
20130055203 | LOCATING ISOLATION POINTS IN AN APPLICATION UNDER MULTI-TENANT ENVIRONMENT - A computer implemented method for locating isolation points in an application under multi-tenant environment includes scanning, using a computer device an application by using scanning rules, to obtain potential isolation points and relationships between the potential isolation points; specifying at least one isolation point among the potential isolation points; and screening an isolation point from the potential isolation points by using relationships between the specified at least one isolation point and the remaining potential isolation points. | 2013-02-28 |
20130055204 | LOCATING ISOLATION POINTS IN AN APPLICATION UNDER MULTI-TENANT ENVIRONMENT - An apparatus for locating isolation points in an application under multi-tenant environment includes a scanning module configured to scan the application, by using scanning rules, to obtain potential isolation points and relationships between the potential isolation points; a specifying module configured to specify at least one isolation point among the potential isolation points; and an isolation point screening module configured to screen an isolation point from the potential isolation points by using relationships between the specified at least one isolation point and the remaining potential isolation points. | 2013-02-28 |
20130055205 | FILTERING SOURCE CODE ANALYSIS RESULTS - A novel system, computer program product and method and system is provided for filtering the results of a source code analysis tool to present only the most relevant results to a user. A source code analysis tool is used to detect problems in source code files. Of the problems that are detected, some may be irrelevant to a user, making it harder for the user to interpret the results. The present invention removes some of the detected problems, presenting the user with a smaller set of problems to consider. The problems may be filtered by removing problems in files that have not been modified for a certain period of time. In addition, the problems may also be filtered by removing problems in files that have been modified by fewer than a given number of people. The problems may also be filtered by removing problems that occur in third-party source code. | 2013-02-28 |
20130055206 | Synchronously Debugging A Software Program Using A Plurality Of Virtual Machines - Methods, apparatuses, and computer program products for synchronously debugging a software program using a plurality of virtual machines are provided. Embodiments include controlling, by a master debugging module operating on a first virtual machine, execution of the software program within the first virtual machine; controlling, by a slave debugging module operating on a second virtual machine, execution of the software program within the second virtual machine including delaying execution of the software program within the second virtual machine relative to the execution of the software program within the first virtual machine; detecting, by the master debugging module, an error in the execution of the software program within the first virtual machine; and in response to the detection of the error, capturing, by a hypervisor, a snapshot of the second virtual machine. | 2013-02-28 |
20130055207 | DEMAND-DRIVEN ANALYSIS OF POINTERS FOR SOFTWARE PROGRAM ANALYSIS AND DEBUGGING - A “Demand-Driven Pointer Analyzer” (DDPA) provides a “demand-driven” field-sensitive pointer analysis process. This process rapidly and accurately identifies alias sets for selected pointers in software modules or programs of any size, including large-scale C/C++ programs such as a complete operating system (OS). The DDPA formulates the pointer analysis task as a Context-Free Language (CFL) reachability problem that operates using a Program Expression Graph (PEG) automatically constructed from the program code. The PEG provides a node and edge-based graph representation of all expressions and assignments in the program and allows the DDPA to rapidly identify aliases for pointers in the program by traversing the graph as a CFL reachability problem to determine pointer alias sets. In various embodiments, the DDPA is also context-sensitive. | 2013-02-28 |
20130055208 | Performing Taint Analysis for Javascript Software Using a Control Flow Graph - In one embodiment, marking an object in source code of a software program written in JavaScript; identifying one or more locations paired with the object in the source code of the software program; constructing a control flow graph (CFG) for the software program; and determining whether there is any path in the CFG that leads from a first node corresponding to the marked object to a second node corresponding to any identified location paired with the object. | 2013-02-28 |
20130055209 | Constructing a Control Flow Graph for Javascript Software - In one embodiment, constructing a λ | 2013-02-28 |
20130055210 | Symbolic Execution of Javascript Software Using a Control Flow Graph - In one embodiment, accessing a control flow graph (CFG) of a software program written in JavaScript; identifying one or more paths in the CFG; and performing symbolic execution on the software program using the CFG. | 2013-02-28 |
20130055211 | CLIENT-SIDE POLICY ENFORCEMENT OF DEVELOPER API USE - Methods and systems are disclosed that allow automated pre-qualification and qualification of an application. An application description can be generated for an application submitted by a developer, the application description can be automatically examined to determine whether the application complies with rules or guidelines (e.g., policies) of a platform. If the application complies with the rules or guidelines, the application can be pre-qualified and submitted for approval and distribution. If the application does not comply with the rules or guidelines, the application developer can be notified of the errors in the application and the developer can be prevented from uploading the application for approval and distribution. | 2013-02-28 |
20130055212 | SYSTEM AND METHOD FOR GENERATING APPLICATION REQUIREMENTS - A method for execution by a processing module begins by receiving inputted requirements and parameters. The method continues by generating application requirements based on the inputted requirements, the parameters, and verification feedback. For one or more application requirements, the method continues by determining whether the generating of the one or more application requirements is consistent with valid system states and correctness criteria to produce one or more verification results. For the one or more application requirements, the method continues by comparing the one or more verification results with one or more verification thresholds to produce the verification feedback. | 2013-02-28 |
20130055213 | SYSTEM AND METHOD FOR TESTING APPLICATION CODE - A testing unit includes an input/output module and a processing module. The input/output module receives application requirements and parameters. The processing module generates a set of test cases based on the application requirements and the parameters; adjusts at least some of the set of test cases based on a code generation progression to produce targeted progression test cases; and tests a developing application code based on the targeted progression test cases, wherein the code generation progression indicates a level of development of the developing application code. | 2013-02-28 |
20130055214 | SYSTEM AND METHOD TO INDICATE CODE BLOCK EXECUTION - In one implementation, computer executable instructions are provided to identify a group of instructions corresponding to a code block for an executable module. The instructions increment a counter associated with the code block to indicate the code block has been tested. | 2013-02-28 |
20130055215 | CAPTURING MULTI-COMPONENT TRACE FOR UNIT FOR WORK - Provided are techniques for the tracing of computer processes and, more specifically, to techniques that enable a work unit to be traced across multiple processing components. A data structure is created and associated with a work unit. The first time a unit of work is processed a tracing context is retrieved form a pool and associated with the data structure. As the unit of work is passed from component to component, the data structure is passed so that each component has access and is able to augment the same tracing context associated with the unit of work. | 2013-02-28 |
20130055216 | APPLICATION MODIFICATION PORTION SEARCHING DEVICE AND APPLICATION MODIFICATION PORTION SEARCHING METHOD - There are provided: a test executing section which generates a plurality of logs when executing a coverage test for an application based on an inputted parameter; and a result processing section which generates a point candidate report based on the plurality of logs. The plurality of logs respectively indicate a call stack of a method designating the parameter as an argument among a plurality of methods called during execution of the coverage test. The call stack indicates a location on the application, in which a call of the method is defined. The point candidate report indicates a candidate for a point in the application, for which a modification is necessary when a dispatch of process is executed based on the parameter. | 2013-02-28 |
20130055217 | BREAKPOINT SYNCHRONIZATION FOR MODIFIED PROGRAM SOURCE CODE - A method for breakpoint synchronization in program source code includes in response to creation of a breakpoint in the program source code, storing by a computer, in a breakpoint store, a line number of the breakpoint and line contents corresponding to text located at the stored line number in the program source code; in the event the program source code is modified, synchronizing the breakpoint with the modified program source code, wherein synchronizing the breakpoint with the modified program source code comprises: searching the modified program source code for the stored line contents; identifying an updated line number for the breakpoint; inserting the breakpoint at the updated line number in the modified program source code; and updating the breakpoint store with the updated line number. | 2013-02-28 |
20130055218 | Automating Software Testing - A system and method of automating software testing is provided. The system and method may determine whether some of a plurality of anchor points within application instructions is triggered in response to input from a current operation within operation instructions. If some of the plurality of anchor points is triggered, one of the triggered anchor points may be selected. Instructions may be generated that configure a given processor to pause after the current operation until the selected one of the triggered anchor points completes. | 2013-02-28 |
20130055219 | OVERLAY IDENTIFICATION OF DATA PROCESSING TARGET STRUCTURE - A method, system, and computer program product for identifying an overlay of a data processing target structure in a computing environment is provided. At least one of examining a mapping macro for the target structure with a set of valid ranges, comparing the set of valid ranges with the target structure to identify a string of at least one first invalid value and a last invalid value and locate invalid regions of the target structure, and examining executable code associated with the target structure, comparing at least one unchanged module against at least one additional module exhibiting an overlay characteristic to identify the string of the at least one first invalid value and the last invalid value and locate invalid regions of the target structure, is performed. | 2013-02-28 |
20130055220 | Tracking Variables in Javascript Software Using a Control Flow Graph - In one embodiment, marking a variable in source code of a software program written in JavaScript; constructing a control flow graph (CFG) for the software program; and tracking the marked variable through the CFG. | 2013-02-28 |
20130055221 | Detecting Errors in Javascript Software Using a Control Flow Graph - In one embodiment, accessing a control flow graph (CFG) of a software program written in JavaScript; accessing a set of specification requirements of the software program; and determining if there is any portion of the CFG that violates any specification requirement of the software program. | 2013-02-28 |
20130055222 | MAGNETIC RESONANCE IMAGING SYSTEM WITH PROGRAMMABLE SUBSYSTEM AND METHOD FOR PROGRAMMING - A Magnetic Resonance Imaging (MRI) system with programmable subsystem and method for programming are provided. One method includes receiving programming code having one or more Application Programming Interfaces (APIs), wherein the APIs include one or more function calls to a library of routines. The method also includes compiling the programming code with the library of routines and controlling the operation of the MRI system using the compiled programming code. | 2013-02-28 |
20130055223 | Compiler with Error Handling - Disclosed is a programming language system that can produce executable program code from source code, even if the source code contains errors. In embodiments, the programming language system includes a fault tolerant compiler that can detect errors in the source code, but nonetheless produce valid compiler constructs representative of the errors in the source code. Accordingly, the compilation process can proceed despite errors in the source code and produce executable program code. | 2013-02-28 |
20130055224 | OPTIMIZING COMPILER FOR IMPROVING APPLICATION PERFORMANCE ON MANY-CORE COPROCESSORS - A system and method for compiling includes parsing code of an application stored in a computer readable storage medium to identify one or more parallelizable code portions. At least one parallelizable code portion is optimized by transforming offload construct code portions to provide an optimized application. | 2013-02-28 |
20130055225 | COMPILER FOR X86-BASED MANY-CORE COPROCESSORS - A system and method for compiling includes, for a parallelizable code portion of an application stored on a computer readable storage medium, determining one or more variables that are to be transferred to and/or from a coprocessor if the parallelizable code portion were to be offloaded. A start location and an end location are determined for at least one of the one or more variables as a size in memory. The parallelizable code portion is transformed by inserting an offload construct around the parallelizable code portion and passing the one or more variables and the size as arguments of the offload construct such that the parallelizable code portion is offloaded to a coprocessor at runtime. | 2013-02-28 |
20130055226 | INTEGRATION OF TRACE SELECTION AND TRACE PROFILING IN DYNAMIC OPTIMIZERS - Integrated trace selection and profiling in dynamic optimizers may include selecting a trace head based on profile of basic blocks that are executed. The basic blocks executed from the trace head may be recorded as a trace. The trace may be added to a trace nursery in non-compiled state. The trace may be interpreted and profiled until the trace matures. Under a profiling mode, path sensitive runtime information such as values, types, targets of call-sites, and exit frequencies can be collected. The trace may be moved out of the nursery to a compilation queue in response to determining that the trace has matured based on an execution count of the profiled trace. | 2013-02-28 |
20130055227 | SOFTWARE APPLICATION PORTING SYSTEM - A software application porting system facilitates the transition of code and data compatible with an old platform version to a new platform version. The software application porting system identifies differences between the platform versions by comparing sample source code objects or sample data schemas. Then, the software application porting system utilizes the identified differences to perform an automated transformation of software application objects and schemas. | 2013-02-28 |
20130055228 | System and Method for Installing a Patch on a Computing System - According to one embodiment, a system includes a memory and a processor. The processor receives a message that includes a patch for installation and one or more requirements to be satisfied before the patch can be installed. The patch is configured to update the computing system. The processor also repeatedly collects information from one or more sensors until it is determined, based on the collected information, that the one or more requirements have been satisfied. Upon determining that the one or more requirements have been satisfied, the processor further conducts an installation process of the patch on the computing system. Upon determining that the installation process of the patch is finished, the processor further transmits a confirmation report indicating whether the patch was successfully installed. The confirmation report is generated and signed by a unique element associated with the computing system. | 2013-02-28 |
20130055229 | PROJECTION SYSTEM AND METHOD FOR UPDATING THE SAME - A projection system including a first projector and a plurality of second projectors is provided. The first projector has a control interface, a first transmission interface, a second transmission interface and a first image unit. The control interface is used for receiving an update message, and the first image unit performs firmware updating according to the update message. Each of the second projectors has a third transmission interface, a fourth transmission interface and a second image unit. The first transmission interface, the second transmission interface, the third transmission interfaces and the fourth transmission interfaces are connected in series to form a transmission channel. The first image unit transmits the update message to the second image units through the transmission channel, and the second image units perform firmware updating according to the update message. | 2013-02-28 |
20130055230 | METHOD AND APPARATUS TO INSTALL SOFTWARE AUTOMATICALLY - In an apparatus to install software, when a Basic Input/Output System (BIOS) that is stored in a first storage unit is driven, a first program that is stored in the first storage unit is copied to a second storage unit. Thus, when an operating system (OS) is driven, the first program of the second storage unit is executed, and a second program that installs software automatically and updates software is installed so that software may be automatically installed and updated by the second program. | 2013-02-28 |
20130055231 | SYSTEM AND METHOD FOR INCREMENTAL SOFTWARE INSTALLATION - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for performing incremental software installations. The system identifies a set of files associated with one or more software programs. Each file can be a component of a software program, or any file accessed by the software program or system when the software program is executed. The system receives a list of files associated with a software version that is not installed on the system. The system determines the differences between the set of files and the list of files, and receives a missing file from the list of files based on the differences. Finally, the system builds the software version on the system using the set of files and the missing file. In building the software version, the system does not assume a linear progression of updates and is able to reuse existing files to create nonlinear variations of software. | 2013-02-28 |
20130055232 | MECHANISM FOR FACILITATING DYNAMIC FORMAT TRANSFORMATION OF SOFTWARE APPLICATIONS IN AN ON-DEMAND SERVICES ENVIRONMENT - In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic zero-downtime updating of formats of software applications in an on-demand services environment. In one embodiment and by way of example, a method includes receiving a request to facilitate a format change to a current version of a software application at a computing device, and retrieving a trigger corresponding to the format change, where a trigger may include a version indicator to indicate a past version of the software application relating to the format change. The method may further include comparing the current version and the indicated past version of the software application, and invoking the format change to the current version of the software application based on the retrieved trigger and the version indicator. | 2013-02-28 |
20130055233 | STREAMLINED METHODOLOGY FOR RESOLVING SOFTWARE INTEGRATION CONFLICTS - A computer-based system to integrate code changes for a software application is provided. The system detects when a requested code change for a branch of the software application conflicts with another code change, and generates a blocked change notification corresponding to the detected conflict. The blocked change notification includes a blocked change identifier corresponding to the requested code change. The notification is delivered to a user device, which responds with a conflict resolution response that includes at least one code change file associated with the requested code change, along with an integration annotation that conveys the blocked change identifier and a branch name identifier that identifies the branch of the software application. The system acts upon the integration annotation to integrate the at least one code change file into the branch of the software application. | 2013-02-28 |
20130055234 | MEDIA MANAGER UPGRADING - A device may execute a media manager application for managing media content stored by the device and download a media manager application upgrade using a background download operation that is independent from execution of the media manager application. The device may cache the media manager application upgrade in a cache memory and notify a user of the device that the media manager application upgrade is ready for installation. The device may receive an install command, corresponding to the media manager application upgrade, from the user and install the media manager application upgrade in response to the install command. | 2013-02-28 |
20130055235 | CUSTOM CODE INNOVATION MANAGEMENT - A method to manage program code that runs in a computer system comprising: producing a transfer template information definition structure in a computer readable storage device that includes a provider code attribute a similarity measure attribute and at least one results attribute; producing a transfer instance of the transfer template information definition structure that associates a provider code object identified as corresponding to the respective managed code object with the provider object code attribute and that associates the determined measure of similarity with the similarity measure attribute; using the transfer instance to obtain results information from a provider system that includes information about the provider code object. | 2013-02-28 |
20130055236 | METHOD AND SYSTEM FOR INTEGRATED ASSET MANAGEMENT - The method and system of the present invention provides an improved technique for integrated asset management. Information is aggregated from a variety of sources into a centralized computerized database. Thereafter, asset transition events are scheduled. Information from the centralized computerized database is used in the performance of the asset transition events and information relating to the asset transition events is added to the centralized computerized database. Subsequent changes to the asset are also recorded into the centralized computerized database. As a result, a plethora of information is available within said database for the purpose of managing future asset transition events. | 2013-02-28 |
20130055237 | SELF-ADAPTING SOFTWARE SYSTEM - A software system, such as an operating system, that has multiple parts can be deployed to a computing device incrementally, rather than all at once. The software system self-adapts to the user's needs by installing and removing system extensions automatically without user intervention. A core part of the software system is deployed in the computing device, and system extensions are delivered to the computing device when needed. The software system is aware of the system extensions, so they appear to be part of the system, even though they have not yet been downloaded. The system extensions can be delivered to the computing system on demand or over time during idle times of the computing device. Unused system extensions can be removed from the computing device, and can be downloaded again when next needed. | 2013-02-28 |
20130055238 | SYSTEM AND METHOD FOR PROVIDING VIRUS PROTECTION - A terminal device may backup data in a cloud server. The cloud server may generate a virtual apparatus to perform substantially the same operations as the terminal device, and may install an application in the virtual apparatus prior to the application being installed in the terminal device, thereby performing a virus check before the application is installed in the terminal device. In addition, the terminal device may store backup data in the cloud server. If the terminal device malfunctions, the terminal device may be restored by receiving the stored backup data from the cloud server. | 2013-02-28 |
20130055239 | PROVISIONING OF VIRTUAL MACHINE POOLS BASED ON HISTORICAL DATA IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention generally describe how to utilize a pool of raw computing resources to dynamically resize environments due to workloads. Specifically, embodiments of the invention provide an approach for generating a partially pre-provisioned pool of virtual machines (VMs). The pool is typically derived from a history of patterns weighted by a potential state of a corresponding VM image to fulfill a workload request. For each VM instance, this approach determines/calculates the number of times that an instance represents a possible starting point for a VM request. The starting points are then normalized to create a probability distribution of the resulting partially pre-provisioned pool of virtual machines. | 2013-02-28 |
20130055240 | VIRTUAL PORT COMMAND PROCESSING DURING MIGRATION OF VIRTUAL MACHINE - In one embodiment, a method includes upon receipt from a first host of a command to pause a virtual port (Vport) associated with a first physical port establishing a connection with the first host, changing a current state of the Vport from an active state to a paused state. The changing of the current state of the Vport to the paused state does not tear down a current session between the Vport and a set of storage disks. The method further includes upon receipt from a second host of a command to resume the Vport at a second physical port establishing a connection with the second host, changing the current state of the Vport from the paused state to the active state and associating the Vport with the second physical port. | 2013-02-28 |
20130055241 | Rapid Provisioning of Virtual Machines Based on Multi-Dimensional User Request Patterns in a Cloud - A method, an apparatus and an article of manufacture for pre-provisioning a virtual machine instance. The method includes deriving a weight function for at least one virtual machine request based on historical data of the at least one virtual machine request to create a weighted virtual machine request for each request, capturing at least one inter-arrival pattern of requests, and applying the at least one pattern to the at least one weighted request to create a prioritized ordering of the at least one weighted request, and pre-provisioning at least one instance of a virtual machine image based on the prioritized ordering of the at least one weighted request. | 2013-02-28 |
20130055242 | MECHANISM FOR MANAGED NETWORK FILTER/FORWARD PROGRAMMING IN A VIRTUALIZATION SYSTEM - A mechanism for managed network filter/forward programming in a virtualization system is disclosed. A method of the invention includes receiving a network programming request from a hypervisor managing a virtual machine (VM), wherein the hypervisor intercepted the network programming request from the VM, determining whether the network programming request satisfies an administrative network policy, and updating network configuration settings as requested by the network programming request if the network programming request satisfies the administrative network policy, wherein the updating occurs without restarting the VM. | 2013-02-28 |
20130055243 | Unified Management Architecture to Support Multiple Platform-as-a-Service Workloads - An information handling system includes a memory and a workload manager. The memory stores a first application associated with a first platform of a plurality of platforms, and a second application associated with a second platform of the plurality of platforms. The workload manager is configured to receive rights and policies for the first application, and rights and policies for the second application; to include the rights and policies for the first application as metadata in the first application, and the rights and policies for the second application as metadata in the second application; to receive a selection of the first application, to determine whether features for the first application are currently running; if the features for the first application are not currently running, create a first virtual machine having the first platform, and the rights and policies for the first application; and to provide an instance of the first application on the first virtual machine. | 2013-02-28 |
20130055244 | EXTENSIBLE INFRASTRUCTURE FOR REPRESENTING NETWORKS INCLUDING VIRTUAL MACHINES - Embodiments provide a virtual machine infrastructure including an application model and a user interface for displaying data associated with a plurality of nodes. The user interface is arranged in a hierarchy of views. An application is added to the infrastructure by adding an edge category and a view extension to the infrastructure. The user interface simultaneously displays the added view extension together with a view extension provided by another application. | 2013-02-28 |
20130055245 | MECHANISM FOR FLOW CONTROL-BASED VIRTUAL MACHINE (VM) REQUEST QUEUING - A mechanism for flow control-based virtual machine (VM) request queuing is disclosed. A method of the invention includes implementing a pass-through mode for handling of one or more requests sent to a hypervisor by a virtual machine (VM) managed by the hypervisor, determining that a number of outstanding requests associated with the VM has exceeded a first threshold, implementing a queued mode for handling the one or more requests sent to the hypervisor from the VM, determining that a number of outstanding requests associated with the VM has fallen below a second threshold, implementing the pass-through mode for handling the one or more requests sent to the hypervisor from the VM, and repeating the implementing and determining as long as the VM continues to send requests to the hypervisor. | 2013-02-28 |
20130055246 | SYSTEMS AND METHODS FOR IDENTIFYING VIRTUAL MACHINES IN A NETWORK - Embodiments described herein relate to systems and methods for identifying virtual machines in a network. The systems and methods comprise a virtual asset tool that can interface with a virtualization manager to receive metadata identifying virtual machines hosted by a plurality of physical machines. The virtual asset tool can subscribe to updates associated with the virtual machines, such as changes to the virtual machines, or additions or deletions of virtual machines. In response to receiving an update, the virtual asset tool can modify an asset record associated with the virtual machines and any corresponding descriptions. In embodiments, the virtual asset tool can schedule vulnerability scans for any or all of the virtual machines. | 2013-02-28 |
20130055247 | MANAGEMENT OF SOFTWARE UPDATES IN A DATACENTER - An approach to managing software components in a datacenter having virtualized components includes maintaining a suitable data construct for representing the virtualized elements. In embodiments, virtualized elements include knowledge relating to instantiations of virtual machines. Management of software components includes traversing a data representation of the datacenter, and assessing the compatibility of the software component with components in the datacenter that relate to the target of the software component. | 2013-02-28 |
20130055248 | METHOD OF BALANCING WORKLOADS IN OBJECT STORAGE SYSTEM - The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. When traffic through a particular protocol endpoint is busy, the logical storage volume undergoes a rebind process pursuant to which the logical storage volume is bound to a new protocol endpoint, and the binding to the old protocol endpoint is removed upon completion of all pending input-output commands issued through the old protocol endpoint. | 2013-02-28 |
20130055249 | VIRTUAL MACHINE PROVISIONING IN OBJECT STORAGE SYSTEM - The storage system exports logical storage volumes that are provisioned as storage objects. These storage objects are accessed on demand by connected computer systems using standard protocols, such as SCSI and NFS, through logical endpoints for the protocol traffic that are configured in the storage system. When a virtual machine is provisioned, logical storage volumes include a logical metadata storage volume and logical data storage volumes. The logical metadata storage volume stores metadata for the virtual machine such as configuration and log files, swap file, and disk descriptor files. Each disk descriptor file is provided for one logical data storage volume and stores metadata about the logical data storage volume such as size and unique identifying data. | 2013-02-28 |
20130055250 | PERFORMANCE BENCHMARKING IN VIRTUAL MACHINES - A virtual benchmarking module generates a first virtual machine and a second virtual machine from a preconfigured image of a computing system. The virtual benchmarking module runs the first virtual machine on a first hardware platform and causes a benchmark program to be executed on the first virtual machine to measure a performance level of a first computer application program. The virtual benchmarking module runs the second virtual machine on a second hardware platform and causes the benchmark program to be executed on the second virtual machine to measure a performance level of a second computer application program. The virtual benchmarking module compares the performance levels of the first and second computer application programs, where the virtual machines counteract an effect of a difference between the first and second hardware platforms on the performance levels. | 2013-02-28 |
20130055251 | SELECTION OF VIRTUAL MACHINES FROM POOLS OF PRE-PROVISIONED VIRTUAL MACHINES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a set of algorithmic methods that can be used to select which partially and/or pre-provisioned virtual machines (VMs) should be used as a base platform to satisfy a new workload (e.g., provisioning) request received in a networked computing environment (e.g., a cloud computing environment). Specifically, when a workload request is received, a set (e.g., at last one) of software programs needed to process the workload request is identified. Then, a set of VMs is selected from a pool of pre-provisioned VMs having the set of software programs. In general, multiple methods and/or factors can be followed to select the set of VMs. Examples include a length of time to install the set of VMs, a probability of the set of VMs being in demand, and/or or a quantity of the set of VMs having the set of software programs. Once the set of VMs has been selected, the set of VMs may be installed, and the workload request can be processed using the set of software programs. | 2013-02-28 |
20130055252 | METHODS AND APPARATUS TO PROVISION VIRTUAL MACHINE RESOURCES - Methods and apparatus are disclosed to provision virtual machine resources. An example method includes labeling a copy of memory associated with an established virtual machine with an execution status based on an architecture type associated with the copy, and constraining a fetch operation in response to a page fault to a labeled portion of the copy that matches an architecture type of a received processor instruction. | 2013-02-28 |
20130055253 | CLOUD-BASED BUILD SERVICE - Building binary packages for software products, particularly large-scale software products, is a highly computation intensive process. Thus, it is desirable to distribute the workload over a large number of computing nodes so as to have the build process complete in an optimal period of time. One environment providing compute resources that can be utilized for a highly available and dynamically scalable distributed build process is an elastic compute cloud. In such an environment, virtual machines can be instantiated and destroyed as the resource requirements of the build process dictate. This has the advantage that dedicated hardware is unneeded, and excess capacity on the hardware employed can be employed for other computation tasks when the build process is idle. Presented herein are systems, methods and computer storage media for distributing a highly available and scalable build service, suitable for use in an elastic compute environment or other distributed environment. | 2013-02-28 |
20130055254 | METHODS AND APPARATUSES FOR PROVIDING A VIRTUAL MACHINE WITH DYNAMIC ASSIGNMENT OF A PHYSICAL HARDWARE RESOURCE - Methods and apparatuses are provided for providing a virtual machine with dynamic direct assignment of a physical hardware resource. A method may include providing a virtual machine with a directly assigned physical hardware resource and an emulated hardware resource corresponding to the directly assigned physical hardware resource. The method may further include causing the virtual machine to hot-swap from using the directly assigned physical hardware resource to using the emulated hardware resource. The method may additionally include, subsequent to causing the virtual machine to hot-swap to using the emulated hardware resource, causing the directly assigned physical hardware resource to be hot-removed from the virtual machine Corresponding apparatuses are also provided. | 2013-02-28 |
20130055255 | SYSTEMS AND METHODS FOR COMMON APPLICATION PLATFORMS UTILIZING SHARED SERVICES - Systems and methods are disclosed that include a common application platform including a set of shared services that can be utilized by applications executing on top the application platform. One embodiment of the invention includes a user device including a processor configured by an operating system, where the processor is further configured by an application platform including a natively implemented virtual. machine configured to execute non-natively implemented applications; a services container, including at least one natively implemented service configured for utilization by an application executing within the virtual machine, wherein the at least one natively implemented service is a shared service that can be utilized by a plurality of different applications; and at least one handler configured to handle communication via at least one socket between an application executing within the virtual machine and the at least one natively implemented service in the services container. | 2013-02-28 |
20130055256 | APPROACHES FOR AUTOMATED MANAGEMENT OF VIRTUAL MACHINES FOR RUNNING UNTRUSTED CODE SAFELY - Approaches for transferring data to a client by safely receiving the data in or more virtual machines. In response to the client determining that digital content, originating from an external source, is to be received or processed by the client, the client identifies, without human intervention, one or more virtual machines, executing or to be executed on the client, into which the digital content is to be stored. In doing so, the client may consult policy data to determine a placement policy, a containment policy, and a persistence policy for any virtual machine to receive the digital content. In this way, digital content, such as executable code or interpreted data, of unknown trustworthiness may be safely received by the client without the possibility of any malicious code therein from affecting any undesirable consequence upon the client. | 2013-02-28 |
20130055257 | COMMUNICATION METHOD AND COMMUNICATION APPARATUS - A gateway apparatus relays communication between first and second servers provided in a data center and an external communication apparatus located outside the data center. A control apparatus obtains an observation result obtained by observing a communication amount being an amount of data transmitted/received per unit time for each of virtual machines operating in the first and second servers in association with a transmission source and a destination of the data. When the first number of hops is smaller than the second number of hops, the control apparatus controls an arrangement of the virtual machines so that the virtual machine whose communication amount with the external communication apparatus is larger is more likely to be placated in the first server. | 2013-02-28 |
20130055258 | Rapid Provisioning of Virtual Machines Based on Multi-Dimensional User Request Patterns in a Cloud - A method for pre-provisioning a virtual machine instance includes deriving a weight function for at least one virtual machine request based on historical data of the at least one virtual machine request to create a weighted virtual machine request for each request, capturing at least one inter-arrival pattern of requests, and applying the at least one pattern to the at least one weighted request to create a prioritized ordering of the at least one weighted request, and pre-provisioning at least one instance of a virtual machine image based on the prioritized ordering of the at least one weighted request. | 2013-02-28 |
20130055259 | METHOD AND APPARATUS FOR HANDLING AN I/O OPERATION IN A VIRTUALIZATION ENVIRONMENT - Machine-readable media, methods, apparatus and system for. Method and apparatus for handling an I/O operation in a virtualization environment. In some embodiments, a system comprises a hardware machine comprising an input/output (I/O) device; and a virtual machine monitor to interface the hardware machine and a plurality of virtual machines. In some embodiments, the virtual machine comprises a guest virtual machine to write input/output (I/O) information related to an I/O operation and a service virtual machine comprising a device model and a device driver, wherein the device model invokes the device driver to control a part of the I/O device to implement the I/O operation with use of the I/O information, and wherein the device model, the device driver and the part of the I/O device are assigned to the guest virtual machine. | 2013-02-28 |
20130055260 | TECHNIQUES FOR WORKLOAD BALANCING AMONG A PLURALITY OF PHYSICAL MACHINES - A method for workload balancing among a plurality of physical machines hosting a plurality of virtual machines (VMs) is disclosed. The method comprises periodically measuring a utilization of each hardware resource in each of the plurality of physical machines; computing a resource utilization score for each hardware resource based on its respective measured utilization; computing a total physical machine utilization score for each physical machine based on the computed resource utilization scores of its respective resources; and upon reception of a client request corresponding to a software application, selecting one physical machine of the plurality of physical machines to serve the client request, wherein the selection is based on the computed total physical machine utilization. | 2013-02-28 |
20130055261 | CONTROLLING VIRTUAL MACHINE IN CLOUD COMPUTING SYSTEM - Described embodiments provide for controlling a plurality of virtual machines in a cloud computing system. At least one virtual storage allocated to the plurality of virtual machines may be monitored. Based on the monitoring result, a virtual storage in a service unable state may be detected among the monitored at least one virtual storage. A virtual machine associated with the detected virtual storage may be temporarily interrupted. | 2013-02-28 |
20130055262 | SYSTEMS AND METHODS OF HOST-AWARE RESOURCE MANAGEMENT INVOLVING CLUSTER-BASED RESOURCE POOLS - Systems and methods are disclosed for managing resources associated with cluster-based resource pool(s). According to illustrative implementations, innovations herein may include or involve one or more of best fit algorithms, infrastructure based service provision, tolerance and/or ghost processing features, dynamic management service having monitoring and/or decision process features, as well as virtual machine and resource distribution features. | 2013-02-28 |
20130055263 | MESSAGE COMMUNICATION TECHNIQUES - A network protocol unit interface is described that uses a message engine to transfer contents of received network protocol units in message segments to a destination message engine. The network protocol unit interface uses a message engine to receive messages whose content is to be transmitted in network protocol units. A message engine transmits message segments to a destination message engine without the message engine transmitter and receiver sharing memory space. In addition, the transmitter message engine can transmit message segments to a receiver message engine by use of a virtual address associated with the receiver message and a queue identifier, as opposed to a memory address. | 2013-02-28 |
20130055264 | SYSTEM AND METHOD FOR PARAMETERIZING DOCUMENTS FOR AUTOMATIC WORKFLOW GENERATION - One embodiment of the present invention sets forth a method for generating a new workflow for an application. The method includes generating a parameter tree related to a current workflow, wherein the parameter tree includes a different node corresponding to each parameter included in one or more documents associated with the current workflow, modifying a value associated with a first node included in the parameter tree based on an input, wherein the first node corresponds to a first parameter included in a first document associated with the current workflow, evaluating a second document associated with the current workflow based on the modified value associated with the first node, and generating the new workflow based on the evaluated second document. | 2013-02-28 |
20130055265 | TECHNIQUES FOR WORKLOAD TOXIC MAPPING - Techniques for toxic workload mapping are provided. A state of a target workload is recorded along with a configuration and state of an environment that is processing the workload. Micro valuations are taken, via statistical sampling, for metrics associated with the workload and for different combinations of resources within the environment. The sampling taken at micro second intervals. The valuations are aggregated to form an index representing a toxic mapping for the workload within the environment. The toxic mapping is mined, in view of policy, to provide conditions and scenarios that may be deemed problematic within the workload and/or environment. | 2013-02-28 |
20130055266 | Cancellable Command Application Programming Interface (API) Framework - Embodiments are provided that include the use of a cancelable command application programming interface (API) framework that provides cooperative multitasking for synchronous and asynchronous operations based in part on a command timing sequence and a cancelable command API definition. A method of an embodiment enables a user or programmer to use a cancelable command API definition as part of implementing a responsive application interface using a command timing sequence to control execution of active tasks. A cancelable command API framework of an embodiment includes a command block including a command function, a task engine to monitor the command function, and a timer component to control execution of asynchronous and synchronous tasks based in part on first and second control timing intervals associated with a command timing sequence. Other embodiments are also disclosed. | 2013-02-28 |
20130055267 | INFORMATION PROCESSING APPARATUS, COMPUTER-READABLE RECORDING MEDIUM, AND METHOD FOR CONTROLLING INFORMATION - An information processing apparatus includes a processor that executes a plurality of application programs, a display that displays results of the execution of the plurality of application programs, and a storage that stores a first table in which the plurality of application programs and a plurality of pieces of operation information corresponding to the plurality of application programs are associated with each other and recorded, and a second table in which the plurality of application programs and order determined on the basis of power to be consumed by the processing unit to execute the plurality of application programs are associated with each other and recorded. | 2013-02-28 |
20130055268 | AUTOMATED WEB TASK PROCEDURES BASED ON AN ANALYSIS OF ACTIONS IN WEB BROWSING HISTORY LOGS - Embodiments of the invention relate to generating automated web task procedures from an analysis of web history logs. One aspect of the invention concerns a method that comprises identifying sequences of related web actions from a web log, grouping each set of similar web actions into an action class, and mapping the sequences of related web actions into sequences of action classes. The method further clusters each group of similar sequences of action classes into a cluster, wherein relationships among the action classes in the cluster are represented by a state machine, and generates automated web task procedures from the state machine. | 2013-02-28 |
20130055269 | TRANSACTION CONCURRENT EXECUTION CONTROL SYSTEM, TRANSACTION CONCURRENT EXECUTION CONTROL METHOD AND PROGRAM - A transaction concurrent execution control system carries out a control of concurrently executing a transaction. The transaction concurrent execution control system includes a transaction execution unit for executing the transaction, a back-off time determination unit for determining a waiting time until the transaction is re-executed when a commitment of the transaction has failed, and a transaction pooling unit for causing the transaction to stand by for re-execution until the waiting time has elapsed when the commitment of the transaction has failed. | 2013-02-28 |
20130055270 | PERFORMANCE OF MULTI-PROCESSOR COMPUTER SYSTEMS - Embodiments of the invention may improve the performance of multi-processor systems in processing information received via a network. For example, some embodiments may enable configuration of a system such that information received is distributed among multiple processors for efficient processing. A user may select from among multiple configuration options, each configuration option being associated with a particular mode of processing information received. By selecting a configuration option, the user may specify how information received is processed to capitalize on the system's characteristics, such as by aligning processors on the system with certain NICs. As such, the processor(s) aligned with a NIC may perform networking-related tasks associated with information received by that NIC. If initial alignment causes one or more processors to become over-burdened, processing tasks may be dynamically re-distributed to other processors. | 2013-02-28 |
20130055271 | APPARATUS AND METHOD FOR CONTROLLING POLLING - A polling control apparatus includes a scheduler to identify polling applications in an electronic terminal and group together the polling events of the polling applications based on the polling times of the polling applications. A polling application may be in more than one group based on the interval between polling events of the application. A traffic manager of the polling control apparatus manages a data connection between the polling control apparatus and a network to connect the electronic terminal to the network at a polling event start time of the group and maintain the data connection until all polling events in the group are completed. The polling control apparatus may adjust the polling time of applications to be during the data connection or based on an importance parameter of the application. | 2013-02-28 |
20130055272 | PARALLEL RUNTIME EXECUTION ON MULTIPLE PROCESSORS - A method and an apparatus that schedule a plurality of executables in a schedule queue for execution in one or more physical compute devices such as CPUs or GPUs concurrently are described. One or more executables are compiled online from a source having an existing executable for a type of physical compute devices different from the one or more physical compute devices. Dependency relations among elements corresponding to scheduled executables are determined to select an executable to be executed by a plurality of threads concurrently in more than one of the physical compute devices. A thread initialized for executing an executable in a GPU of the physical compute devices are initialized for execution in another CPU of the physical compute devices if the GPU is busy with graphics processing threads. | 2013-02-28 |
20130055273 | TERMINAL AND APPLICATION MANAGEMENT METHOD THEREOF - A terminal and application synchronization method is provided for simultaneously updating multiple applications. The application synchronization method includes acquiring a synchronization timing of a previously registered synchronization target application or a common synchronization timing of previously registered synchronization target applications, when an application to be synchronized is added; and adjusting the synchronization timing of the added application in consideration of the previous synchronization timing or the common synchronization timing. | 2013-02-28 |
20130055274 | PROCESS EXECUTION COMPONENTS - Automating processes in an automation platform. Specifying a program that when executed by the platform implements the process. The program including process description, process components. The description including component initialization instructions having input parameter(s) and initialized component execution instructions having an execution state. Components having an initialization interface, an execution interface, and at least one of simulation instructions and operation instructions. Components characterized by output parameters, and operative upon receiving input parameters via the initialization interface to initialize the component. Initialized components operative upon receiving an execution state via the execution interface to execute the initialized component in accordance with the execution state, and in absence of operation instructions, to return a simulated output in the format of the output parameters in accordance with the simulation instructions. Executing the instructions by initializing each component in accordance with the component initialization instructions, executing each initialized component in accordance with the instructions. | 2013-02-28 |
20130055275 | METHOD AND SYSTEM FOR WIRELESS COMMUNICATION BASEBAND PROCESSING - A method and system for prioritized baseband processing in a wireless communication network is disclosed. Parameters affecting processing times for performing tasks associated with different user equipments are evaluated and the tasks are prioritized based on the evaluation. Each task is performed by the baseband processor at a time that is based on the priority assigned to the task. | 2013-02-28 |
20130055276 | TASK SCHEDULING METHOD AND APPARATUS - A task scheduling method and apparatus are provided to execute periodic tasks together with an aperiodic real-time task in a single system, to perform scheduling while satisfying a precedence relation between periodic tasks, and to perform scheduling so that an aperiodic real-time task may be efficiently executed for a residual time left after scheduling of the periodic tasks. Additionally, a component scheduling method and apparatus in robot software are provided. | 2013-02-28 |
20130055277 | Logical Partition Load Manager and Balancer - A mechanism is provided in a data processing system for managing and balancing load in multiple managed systems in a logical partitioning data processing system. Responsive to a critical logical partition requiring additional resources, the mechanism determines whether one or more managed systems have available resources to satisfy resource requirements of the critical partition. The mechanism performs at least one partition migration operation to move at least one logical partition between managed systems responsive to determining that one or more managed systems have available resources to satisfy resource requirements of the critical partition. The mechanism performs at least one dynamic logical partitioning operation to allocate resources to at least one of the one or more critical logical partitions responsive to performing the at least one partition migration operation. | 2013-02-28 |
20130055278 | EFFICIENT MANAGEMENT OF COMPUTER RESOURCES - System, method, and computer-readable medium for managing removal of unused objects on a subject computer system that includes a plurality of computing resources. Current configuration and operational state information of a subject computer system are analyzed to detect a presence of unused objects on the subject computer system. An estimated degree of impact that unused objects have on the workload of at least one computing resource of the plurality of computing resources is obtained. A measure of the exigency of taking action to remove the unused objects is determined based on the estimated degree of impact and on the current degree of workload of the at least one computing resource. Instructions are generated for removing specific ones of the unused objects for which the exigency of taking action is sufficiently great. | 2013-02-28 |
20130055279 | RESOURCE ALLOCATION TREE - A resource credit tree for resource management includes leaf nodes and non-leaf nodes. The non-leaf nodes include a root node and internal nodes. Resource management includes initializing a operation corresponding to a resource pool, selecting, using a hash function, a leaf node of a resource credit tree, and identifying a number of available credits of the leaf node. Resource management may further include traversing, using a backward traversal path, from the leaf node to a non-leaf node based on determining that the number of available credits is less than a required number of credits or determining that capacity of the leaf node is less than the summation of the number of credits to free to the resource credit tree and the number of available credits. Resource management may further allocating and freeing credits from and to the resource credit tree. | 2013-02-28 |
20130055280 | QUALITY OF SERVICE AWARE CAPTIVE AGGREGATION WITH TRUE DATACENTER TESTING - Technologies are generally described for efficient datacenter management. In some examples, client jobs on a datacenter are subcontracted out to another datacenter so that the subcontracted jobs can be pulled back to the original datacenter when capacity becomes available again. A captive aggregator module combining network message, command management, data analysis on QoS effects of traffic relay, and strategic management decides whether it makes sense to keep tasks captively aggregated. A middleware system for testing true performance of an application or surrogate and optimizing among multiple datacenters based on true performance evaluates candidate datacenters prior to subcontracting jobs from the original datacenter. The middleware deploys the application to multiple candidate clouds to perform substantially similar tasks on resources that claim to be roughly equivalent in price/performance. The middleware receives data on actual cost and resource consumption, analyzes differences, and redistributes actual work tasks to take advantage of differences. | 2013-02-28 |
20130055281 | INFORMATION PROCESSING APPARATUS AND SCHEDULING METHOD - An information processing apparatus includes a plurality core sections, an uncore section, and a scheduler. The plurality of core sections correspond to processor cores in a multi-core processor. The uncore section is a resource shared by the core sections. The scheduler controls execution timing for a first process so as to make an unused core section execute the first process in a period in which a second process other than the first process is executed by a part of the plurality of core sections. Controlling the execution timing for the first process is permitted. | 2013-02-28 |
20130055282 | TASK MANAGEMENT METHOD FOR EMBEDDED SYSTEMS - The present invention relates to a task management method and, in particular, to a task management method for efficiently managing task in resource constrained embedded systems where a Memory Management Unit does not exist. In accordance with an aspect of the present invention, a task management method for an embedded system, comprising designing a task management according to a short term task and a long term task; managing stack spaces for the short term task and the long term task; scheduling a time and a space for the short term task and the long term task; performing an adaptive stack management based on stack profiling; providing a uniform programming model for the short term task and the long term task; and implementing the short term task and the long term task | 2013-02-28 |
20130055283 | Workload Performance Control - Methods to provide workload performance control are described herein. Performance statistics for a plurality of workloads are obtained for a second time interval, which includes a plurality of first time intervals. The performance statistics is based on monitored data ( | 2013-02-28 |
20130055284 | MANAGING SHARED COMPUTER RESOURCES - Various systems, processes, and products may be used to manage shared computer resources. In particular implementations, managing shared computer resources may include the ability to execute a first process on a first central processing unit and execute a second process on a second central processing units, wherein the first process and the second process are operable to access a first resource, and to determine at a mutex controller which of the first process and the second process is allowed to access the first resource at a given time. | 2013-02-28 |
20130055285 | DISCOVERY AND ACTIVATION OF APPLICATION EXTENSIONS - The operating system of a computer maintains an extension catalog that stores data relating extensions with information about the contracts the extensions support. Extensions are registered in this catalog according to the contract they implement. The extension catalog can be queried to identify extensions that support a given contract. An extension can be selected from among the results from a query, and the selected extension can be activated. When activated, the extension is set up by the operating system as an independent process from, and with context from, the application for which it is an extension. Information about the extension is provided to the application to enable the extension and the application to communicate according to the supported contract. | 2013-02-28 |
20130055286 | VIRTUAL INTER-PROCESS COMMUNICATION BETWEEN A RADIO EQUIPMENT AND A RADIO EQUIPMENT CONTROLLER IN A BASE STATION OF A WIRELESS COMMUNICATION SYSTEM - Embodiments of a Radio Equipment (RE), and methods of operation thereof, are disclosed. In one embodiment, the RE is designed for Inter-Process Communication (IPC) and is connected to a Radio Equipment Controller (REC) that does not support IPC. In operation, the RE receives a non-IPC message from the REC. An IPC translator of the RE then translates the non-IPC message into an equivalent IPC message and provides the equivalent IPC message to a corresponding process operating on the RE. In one embodiment, multiple processes are operating on the RE, and the IPC translator provides the equivalent IPC message to one of the processes that is responsible for handling the equivalent IPC message. As a result of the IPC translator, IPC signaling occurring at the RE is transparent to the REC. | 2013-02-28 |
20130055287 | MODIFYING APPLICATION BEHAVIOUR - A data processing system comprising: an operating system providing an application programming interface; an application supported by the operating system and operable to make calls to the application programming interface; an intercept library configured to intercept calls of a predetermined set of call types made by the application to the application programming interface; and a configuration data structure defining at least one action to be performed for each of a plurality of sequences of one or more calls having predefined characteristics, the one or more calls being of the predetermined set of call types; wherein the intercept library is configured to, on intercepting a sequence of one or more calls defined in the configuration data structure, perform the corresponding action(s) defined by the configuration data structure. | 2013-02-28 |
20130055288 | Methods and Systems for Dynamically Establishing One or More Connections Between a Software Application and a Cluster of Message Broker - An exemplary method includes a broker-based messaging system detecting a request provided by a software application for the software application to connect to any one of a plurality of brokers included in a cluster of brokers, dynamically identifying, in response to the request and in accordance with a connection distribution heuristic, a broker included in the cluster of brokers and that is available for connection to the software application, and attempting to establish a connection between the software application and the broker. Corresponding methods and systems are also disclosed. | 2013-02-28 |
20130055289 | ENABLING A WEB APPLICATION TO CALL AT LEAST ONE NATIVE FUNCTION OF A MOBILE DEVICE - Enabling a web application to call at least one native function of a mobile device includes accessing the web application by a browser of the mobile device. The web application includes at least one GUI element. The mobile device operates a listener module that is a TCP/IP socket listener listening for an address including a localhost IP address and a port number. Upon selection of the GUI element, a cross domain HTTP request is submitted by the browser to the listener localhost IP address. The listener module receives the request and calls the at least one native function in dependence on the received request. | 2013-02-28 |
20130055290 | Configuring and Relaying Events from a Storage Controller to a Host Server - A mechanism is provided for relaying events from a storage controller to a host server. Responsive to identifying an event occurring within a storage device, a notification is sent to a device server in the host server with which the event is associated. A server virtual disk is identified using a unique identification of the server virtual disk. Responsive to identifying the server virtual disk, at least one device executing an application on the host server is notified of an impending degradation in a mode of operation. | 2013-02-28 |
20130055291 | DESCRIBING NATIVE APPLICATION PROGRAMMING INTERFACES OF AN OPERATING SYSTEM WITH METADATA - Native operating system application programming interfaces (API's) are described using metadata and such descriptions are stored in a standard file format in a known location. By storing API definitions using such metadata, other applications can readily identify and use the APIs. To create such API representations, during development, a developer describes the shape of the API, including (but not limited to) the classes, interfaces, methods, properties, events, parameters, structures and enumerated types defined by the API. This API description is processed by a tool which generates a machine-readable metadata file. The machine-readable metadata file contains the same information as the API description, however in a format designed to be machine read rather than human authored. | 2013-02-28 |
20130055292 | PROJECTING NATIVE APPLICATION PROGRAMMING INTERFACES OF AN OPERATING SYSTEM INTO OTHER PROGRAMMING LANGUAGES - Information about the operating system application programming interfaces is stored in a known format in a known location. This information fully describes the APIs exposed by the operating system and is stored in API metadata files. A language compiler or interpreter uses this API information to build a natural and familiar representation of the native system API in the target language. The language compiler or interpreter can read the API information at compile time and/or runtime. The metadata is used to allow an application to refer to named elements in the API. Projections are built that use the metadata to map named elements in the API to named elements in the target language, and to define wrappers that marshal data of those elements between the target representation and the native operating system representation. | 2013-02-28 |
20130055293 | SYSTEMS AND METHODS FOR UTILIZING SUPPORTED PLAYERS VIA A SHARED MULTIMEDIA FRAMEWORK - A multimedia framework capable of facilitating communication between an application and one or more supported players in accordance with embodiments of the invention is disclosed. One embodiment includes a multimedia framework configured to communicate with at least one application and at least one installed player; where the multimedia framework is configured to receive messages from the at least one application; where the multimedia framework is configured to parse the messages and identify a player and an instruction contained within the message; where the multimedia framework is configured to determine whether the identified player is an installed player; where the multimedia framework is configured to identify at least one player command from a set of common player commands based upon the instruction; where the multimedia framework is configured to provide the at least one player command to the identified installed player. | 2013-02-28 |
20130055294 | EXTENSIBLE FRAMEWORK WHICH ENABLES THE MANAGEMENT OF DISPARATELY LOCATED HETEROGENEOUS SYSTEMS REQUIRING COMMAND AND CONTROL, SITUATIONAL AWARENESS, OPERATIONS MANAGEMENT AND OTHER SPECIFIC CAPABILITIES - The solution described herein, through it's unique design, provides capability such as command and control, situational awareness, operations management, and other tactical capabilities as building blocks to be added or extended for the buildout of specific strategic or tactical solutions. Traditional approaches for the implementation of strategic or tactical systems have historically been stove-piped and build on closed architectures. The solution is architected using open-standards and open-interfaces in order to simplify the integration into both new and legacy system. | 2013-02-28 |