Patent application number | Description | Published |
20090018812 | USING QUANTITATIVE MODELS FOR PREDICTIVE SLA MANAGEMENT - A method of using quantitative models for predictive service level agreement management builds quantitative models, executes the models to produce observations, and determines whether the observations conform to service level agreements. If the observations do not conform to the service level agreements, the method determines the service level agreements that are violated by the observations. Then, the method calculates analytic measures for use in the service level agreements based on the observations and the violations. | 01-15-2009 |
20090018813 | USING QUANTITATIVE MODELS FOR PREDICTIVE SLA MANAGEMENT - A method of using quantitative models for predictive service level agreement management builds quantitative models, executes the models to produce observations, and determines whether the observations conform to service level agreements. If the observations do not conform to the service level agreements, the method determines the service level agreements that are violated by the observations. Then, the method calculates analytic measures for use in the service level agreements based on the observations and the violations. | 01-15-2009 |
20090037389 | Document Comparison Using Multiple Similarity Measures - Disclosed herein is a method for comparing documents. The method includes the steps of: determining a plurality of similarity measures; and determining an overall similarity measure for the plurality of documents, based on the plurality of similarity measures. In one embodiment, the similarity measures are chosen from the group of similarity measures consisting of semantic and reference similarity measures. When comparing documents from the chemical, biochemical or pharmaceutical domains, the determination of the similarity utilizes a determination of structural similarity of the chemical formulas described in the plurality of documents. | 02-05-2009 |
20090122938 | Method and System for Identifying Sources of Operating System Jitter - A method for tuning performance of an operating system, the method comprising identifying all sources of operating system jitter; measuring the impact of each of the operating system jitter source; and tuning performance of the operating system, preferably by use of different approaches/techniques, which could include removing the sources of operating system jitter and/or delaying their execution and/or smoothening their execution over a longer period of time. Computer program code and systems are also provided. | 05-14-2009 |
20090132555 | METHOD FOR VISUALISATION OF STATUS DATA IN AN ELECTRONIC SYSTEM - A method is disclosed for facilitating visualisation of status data in an electronic system. The status data comprises metadata including a plurality of information context categories. The status data also comprises data nodes, each data node including specific instances of a respective context category. The method starts with selecting possible data combinations and permutations of the information context categories, each permutation defining a respective hierarchy. For each permutation, information content of data for each node of the respective hierarchy is estimated and an informative tree and total entropy for all informative nodes are found. The permutation and the informative tree that has the lowest total entropy are then presented to the user. | 05-21-2009 |
20090144736 | Performance Evaluation of Algorithmic Tasks and Dynamic Parameterization on Multi-Core Processing Systems - A method for evaluating performance of DMA-based algorithmic tasks on a target multi-core processing system includes the steps of: inputting a template for a specified task, the template including DMA-related parameters specifying DMA operations and computational operations to be performed; evaluating performance for the specified task by running a benchmark on the target multi-core processing system, the benchmark being operative to generate data access patterns using DMA operations and invoking prescribed computation routines as specified by the input template; and providing results of the benchmark indicative of a measure of performance of the specified task corresponding to the target multi-core processing system. | 06-04-2009 |
20090144738 | Performance Evaluation of Algorithmic Tasks and Dynamic Parameterization on Multi-Core Processing Systems - Apparatus for evaluating the performance of DMA-based algorithmic tasks on a target multi-core processing system includes a memory and at least one processor coupled to the memory. The processor is operative: to input a template for a specified task, the template including DMA-related parameters specifying DMA operations and computational operations to be performed; to evaluate performance for the specified task by running a benchmark on the target multi-core processing system, the benchmark being operative to generate data access patterns using DMA operations and invoking prescribed computation routines as specified by the input template; and to provide results of the benchmark indicative of a measure of performance of the specified task corresponding to the target multi-core processing system. | 06-04-2009 |
20090144744 | Performance Evaluation of Algorithmic Tasks and Dynamic Parameterization on Multi-Core Processing Systems - A method for evaluating performance of DMA-based algorithmic tasks on a target multi-core processing system includes the steps of: inputting a template for a specified task, the template including DMA-related parameters specifying DMA operations and computational operations to be performed; evaluating performance for the specified task by running a benchmark on the target multi-core processing system, the benchmark being operative to generate data access patterns using DMA operations and invoking prescribed computation routines as specified by the input template; and providing results of the benchmark indicative of a measure of performance of the specified task corresponding to the target multi-core processing system. | 06-04-2009 |
20090144745 | Performance Evaluation of Algorithmic Tasks and Dynamic Parameterization on Multi-Core Processing Systems - Apparatus for evaluating the performance of DMA-based algorithmic tasks on a target multi-core processing system includes a memory and at least one processor coupled to the memory. The processor is operative: to input a template for a specified task, the template including DMA-related parameters specifying DMA operations and computational operations to be performed; to evaluate performance for the specified task by running a benchmark on the target multi-core processing system, the benchmark being operative to generate data access patterns using DMA operations and invoking prescribed computation routines as specified by the input template; and to provide results of the benchmark indicative of a measure of performance of the specified task corresponding to the target multi-core processing system. | 06-04-2009 |
20090299722 | METHOD FOR EMULATING OPERATING SYSTEM JITTER - Techniques for emulating operating system jitter on a platform using a given trace are provided. The techniques include calculating a scale factor, wherein the scale factor is equal to a maximum of measured overhead of introducing synthetic jitter on the platform and a resolution of one or more timer calls on the platform, scaling up each of one or more jitter values and each of one or more gaps between each of one or more jitter instances in the trace and an execution period of a benchmark parallel application using the scale factor, introducing synthetic jitter using each of the one or more scaled jitter values and each of the one or more scaled gaps from the trace while running the benchmark parallel application for the scaled execution period to emulate operating system jitter on a platform, and scaling down one or more final time measurements from the benchmark parallel application by the scale factor. | 12-03-2009 |
20100033485 | METHOD FOR VISUALIZING MONITORING DATA - Techniques for visualizing monitoring data are provided. The techniques include generating at least one context from the monitoring data based on a user-provided schema definition, mapping the data from a high dimensional space to a lower dimensional subspace using a topology preserving mapping, organizing the mapped data into a three-dimensional space to allow dynamic selection of a context resolution level across a hierarchy of the at least one context, using the mapped data to identify at least one trend in the data, wherein identifying the at least one trend comprises observing one or more changes over time in one or more activation patterns for each of the at least one context, and visualizing the at least one quantified trend in the data. | 02-11-2010 |
20100058346 | Assigning Threads and Data of Computer Program within Processor Having Hardware Locality Groups - A computer program having threads and data is assigned to a processor having a processor cores and memory organized over hardware locality groups. The computer program is profiled to generate a data thread interaction graph (DTIG) representing the computer program. The threads and the data of the computer program are organized over clusters using the DTIG and based on one or more constraints. The DTIG is displayed to a user, and the user is permitted to modify the constraints such that the threads and the data of the computer program are reorganized over the clusters. Each cluster is mapped onto one of the hardware locality groups. The computer program is regenerated based on the mappings of clusters to hardware locality groups. At run-time, optimizations are performed to improve execution performance, while the computer program is executed. | 03-04-2010 |
20100185823 | ENABLING HIGH-PERFORMANCE COMPUTING ON NON-DEDICATED CLUSTERS - Techniques for enabling high-performance computing are provided. The techniques include resizing a logical partition in a non-dedicated compute cluster server to enable high-performance computing, wherein a high performance computing application is executed such that the high performance computing application is configured to complete execution of each of one or more application threads at a similar instance as a slowest thread in the cluster, and wherein the non-dedicated compute cluster comprises one or more servers and the logical partition is created by partitioning one or more server resources. | 07-22-2010 |
20110054964 | Automatic Documentation of Ticket Execution - Techniques for automatically documenting activity data in connection with execution of a ticket are provided. The techniques include receiving activity data in connection with execution of a ticket, processing the activity data to generate an output, and appending the processed activity data output to the ticket for ticket enrichment. Techniques for identifying a wrong choice of resolution code in connection with a ticket are also provided. The techniques include analyzing one or more previous tickets to determine a category in which a ticket belongs, determining whether a user-defined code is in variance with a system-suggested code, and sending an alert to a system administrator if the user-defined code is different than the system-suggested code. | 03-03-2011 |
20110111799 | Systems and Methods for Predicting Battery Drain Time Caused by Smartphone Applications - Predicting battery drain time that would be caused by a new application being considered for a smartphone. The battery drain time prediction is based on the type of smartphone and type of battery, the battery age, and hardware subunit usage levels. The system may provide a watchdog service for monitoring and storing data of user's smartphone which may then be used to create a user profile. Upon receiving a request for a battery drain time prediction, the system matches the profile of the user's smartphone with an existing profile in the repository having pre-installation and post-installation data for the application being considered. The matching user profile can be used to predict battery drain time that will be caused by the new application. | 05-12-2011 |
20110191461 | SYSTEMS AND METHODS FOR USING WORKLOAD CHARACTERISTICS FOR SIZING AND PLACEMENT FOR POWER-AWARE CONSOLIDATION - Embodiments of the invention provide power savings via performing application workload consolidation to servers using off-peak values for application workload demand. Embodiments of the invention are designed to achieve significant power savings while containing performance risk associated with server consolidation. | 08-04-2011 |
20120102003 | PARALLEL DATA REDUNDANCY REMOVAL - A method, system, and computer usable program product for parallel data redundancy removal are provided in the illustrative embodiments. A plurality of values is computed for a record in a plurality of records stored in a storage device. The plurality of values for the record is distributed to corresponding queues in a plurality of queues, wherein each of the plurality of queues is associated with a corresponding section of a Bloom filter. A determination is made whether each value distributed to the corresponding queues for the record is indicated by a corresponding value in the corresponding section of the Bloom filter. The record is identified as a redundant record in response to a determination that each value distributed to the corresponding queues for the record is indicated by a corresponding value in the corresponding section of the Bloom filter. | 04-26-2012 |
20120142319 | SYSTEMS AND METHODS FOR JOINT ANALYTICS ON USER LEVEL AND NETWORK LEVEL DATA OF A COMMUNICATIONS NETWORK - Systems and associated methods provide for joint analytics on user level data and network level data. Systems and methods provide for accessing telecommunication network user level data and network level data and integrating analysis on both data types to produce a common result. Embodiments utilize joint analytics to generate patterns and rules concerning the content and services accessed by a user, when they are accessed, and how they are accessed. | 06-07-2012 |
20130007538 | SYSTEMS AND METHODS FOR FAST DETECTION AND DIAGNOSIS OF SYSTEM OUTAGES - Methods and arrangements for detecting and diagnosing system outages. A system outage is ascertained and aberrant user activities are categorized, as possible contributors to the system outage, based on system impact. User activities and system impact are learned, and user activities and system impact are compared against predetermined rules. A system outage alert is generated, and a user activity responsible for the system outage is displayed. | 01-03-2013 |
20130061092 | FAST DETECTION AND DIAGNOSIS OF SYSTEM OUTAGES - Methods and arrangements for detecting and diagnosing system outages. A system outage is ascertained and aberrant user activities are categorized, as possible contributors to the system outage, based on system impact. User activities and system impact are learned, and user activities and system impact are compared against predetermined rules. A system outage alert is generated, and a user activity responsible for the system outage is displayed. | 03-07-2013 |
20130290170 | ESTABLISHING PERSONALIZED MOBILE MONEY TRANSFER LIMITS - Methods and arrangements for establishing financial transfer limits. A customer reputation score for mobile money transfer is determined. A mobile money transfer limit is established based on the customer reputation score, and the customer reputation score is updated in response to predetermined parameters. | 10-31-2013 |
20140047436 | IMAGE INSTANCE MAPPING - A method and system for image instance mapping is provided. The method includes receiving from change agents on virtual machine instances periodic monitoring data indicating changes for each virtual machine instance. The periodic monitoring data is analyzed and unique updates are applied to the virtual machine instances. High level semantic updates to the virtual machine instances are identified and updates associated with a golden master image are tracked. High level semantic updates to the golden master image are identified and in response, a version tree configured to track drift of each virtual machine instance with respect to golden master image is maintained. | 02-13-2014 |
20140376722 | ACCESSING LOCAL APPLICATIONS WHEN ROAMING USING A NFC MOBILE DEVICE - A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the second partition of the SIM. | 12-25-2014 |
20140380044 | ACCESSING LOCAL APPLICATIONS WHEN ROAMING USING A NFC MOBILE DEVICE - A method of accessing local applications when roaming on a NFC mobile device may include creating a first partition and a second partition on a secure element (SE) of a subscriber identification module (SIM) of a near field communication (NFC) enabled device. The home TSM separates the first partition and the second partition by public key encryption. The home TSM generates cryptographic keys in response to a request by a roaming TSM for access to the second partition of the SIM. Following the exchange of security keys, the home TSM delegates to the roaming TSM access to the second partition of the SIM. | 12-25-2014 |
20150058054 | Modularly Managed Service Platform - A service method and associated system is provided. The method includes generating event types for events and services associated with the events. Virtual or physical machines associated with the services are provisioned and a message associated with a first event is published. The message is routed to a queue of a second service and the second service is notified of the message. The services are enabled and a selection for a sub-set of the services is received. The selection is enabled. | 02-26-2015 |
20150074105 | MOBILE APPLICATION DATA STORAGE ALLOCATION - In a method for allocating and storing application data for applications of mobile devices, one or more processors receive one or more portions of application data of an application selected by a user of a mobile computing device. The one or more processors determine where to store each of the one or more portions of application data based on predefined instructions. The one or more processors cause each of the one or more portions of application data to be stored based on the determination. | 03-12-2015 |
20150074275 | MOBILE APPLICATION DATA STORAGE ALLOCATION - In a method for allocating and storing application data for applications of mobile devices, one or more processors receive one or more portions of application data of an application selected by a user of a mobile computing device. The one or more processors determine where to store each of the one or more portions of application data based on predefined instructions. The one or more processors cause each of the one or more portions of application data to be stored based on the determination. | 03-12-2015 |