Patent application number | Description | Published |
20080270994 | METHOD AND APPARATUS OF PARTITIONED MEMORY DUMP IN A SOFTWARE SYSTEM - A method and apparatus of partitioned memory dump in a software system is provided, the apparatus comprising: a monitor for, during the execution of the software system, monitoring the memory allocations and deallocations of objects in the software system and according to the results of the monitoring, assigning the allocated objects in the software system into corresponding memory partitions, wherein the memory space of the software system is partitioned according to a given partitioning scheme; an event detector for detecting a triggering event of memory dump; and a dumper for dumping related memory partitions according to the detected triggering event of memory dump. Preferably, the apparatus further comprises an analyzer for analyzing the dumped information, and generating a new dump triggering event or a new partitioning scheme based on the analysis results. | 10-30-2008 |
20090037687 | PARTITION-BASED METHOD AND APPARATUS FOR DIAGNOSING MEMORY LEAK IN JAVA SYSTEMS - A partition-based method for diagnosing memory leaks in Java systems, comprising dividing heap memory of a Java virtual machine into a plurality of partitions based on a partition plan, wherein each partition has at least one partition owner; monitoring the status of the respective partitions to determine whether there is a partition in which the memory space is exhausted; and if there is a partition in which the memory space is exhausted, determining that the memory leak may occur in the partition and analyzing the partition to obtain leaked objects and objects related to the leaked objects. The present invention also provides a partition-based apparatus for diagnosing memory leak in Java systems. | 02-05-2009 |
20090063572 | METHOD AND DEVICE FOR ANALYZING CAUSE OF CONSTRAINT VIOLATION BASED ON CONSTRAINT PATTERN - A method and device for performing a constraint failure analysis on an instance model. The present invention provides a convenient tool to bridge between a model-constraint designer and a model user, reduce load for model/constraint usability, simplify the learning curve, and assist to make a model correction for the model user. | 03-05-2009 |
20090100172 | METHOD AND APPARATUS FOR MONITORING WEB SERVICES RESOURCE UTILIZATION - A method for dynamically adjusting resources among a plurality of co-existing applications comprises the steps of: building a relation model between a request number and resource consumption of said plurality of applications; obtaining at multiple sampling moments a request number and resource consumption of each of said plurality of applications; calculating resource consumption ratio of each of said plurality of applications; and analyzing resource consumption of a plurality of currently co-existing applications. | 04-16-2009 |
20090112783 | METHOD AND SYSTEM OF ASSOCIATING A RUNTIME EVENT WITH A COMPONENT - A method and a system of associating a runtime event with a component. The method includes catching the runtime event; catching the context of the current running environment and determining the current component based on said context; and getting the associating policy of current component and determining the responsible component associated with said runtime event based on said associating policy. | 04-30-2009 |
20090199156 | CONSTRAINT LANGUAGE EDITING FOR GENERATING MODEL-RELATED CONSTRAINT EXPRESSIONS - A method and navigation helper for generating constraint language codes for navigation in a constraint language editor. The constraint language editor generates model/instance-related constraint expressions according to the loaded model/instance and related constraints. The navigation is a path implementing the constraints. The method includes parsing the loaded model/instance; calculating a possible association related to the element through the type of the navigation-related element in the model/instance; and calculating a possible navigation path according to the association. A method for generating constraint language codes in a constraint language editor and the constraint language editor includes loading the model/instance; loading constraint patterns for storing parameters and a constraint code template; invoking corresponding helpers, according to the types of parameters stored in the constraint patterns; and generating constraint codes according to the generated parameters and the constraint code template. | 08-06-2009 |
20090254894 | Method and Apparatus for Workflow Based High Availability Analysis - Techniques are disclosed for workflow based high availability analysis in computing systems. For example, a computer-implemented method for analyzing an information network infrastructure to identify one or more availability weak points includes the following steps. A workflow specification is provided based on one or more user-visible processes and an application topology. Service workflows associated with the specification are mapped from the application topology to the infrastructure to generate a workflow data structure. An availability weak point analysis is performed in accordance with the workflow data structure to determine one or more optimal high availability parameters for one or more deployed components of the infrastructure. The one or more optimal high availability parameters are applied in the infrastructure so as to substantially eliminate the one or more availability weak points. | 10-08-2009 |
20100223306 | METHOD AND APPARATUS FOR DISCOVERING APPLICATION CONFIGURATION FILES IN A SYSTEM - A method and apparatus for discovering application configuration files in a system. The method includes the steps of: obtaining a process identifier of an application in concern; comparing the obtained process identifier with a process identifier of a process for operating configuration files in the system; and determining configuration files to be the configuration files of the application in concern if the obtained process identifier is identical to the process identifier of a process for operating the configuration files in the system. Application configuration files can be automatically discovered and thereby monitored, such that the change of the application configuration files can be effectively and accurately detected, so as to facilitate a user to perform various subsequent operations. | 09-02-2010 |
20100241895 | METHOD AND APPARATUS FOR REALIZING APPLICATION HIGH AVAILABILITY - A method and apparatus for realizing application high availability. The application is installed on both a first node and a second node, the first node being used as an active node, and the second node being used as a passive node. The method includes: monitoring access operations to files by an application during its execution on the active node; replicating the monitored updates to the file by the application from the active node to a storage device accessible to the passive node if the application performs updates to a file during the access operations; sniffing the execution of the application on the active node; and switching the active node to the second node and initiating the application on the second node in response to sniffing a failure in the execution of the application on the active node. | 09-23-2010 |
20110078681 | METHOD AND SYSTEM FOR RUNNING VIRTUAL MACHINE IMAGE - A computer-implemented methods and systems for a running virtual machine image in a host machine. One method includes: receiving a virtual machine image provisioning request; sending to a storage server a request to copy a virtual machine image related to the virtual machine image provisioning request; receiving a portion of the virtual machine image; starting a virtual machine in the host machine by running the received portion of the virtual machine image; intercepting a file operation request of a program running in the virtual machine; and acquiring a file related to the file operation request. | 03-31-2011 |
20120216070 | METHOD AND APPARATUS FOR REALIZING APPLICATION HIGH AVAILABILITY - A method, apparatus, and computer program product for realizing application high availability are provided. The application is installed on both a first node and a second node, the first node being used as an active node, and the second node being used as a passive node. The method includes: monitoring access operations to files by an application during its execution on the active node; replicating the monitored updates to the file by the application from the active node to a storage device accessible to the passive node if the application performs updates to a file during the access operations; sniffing the execution of the application on the active node; and switching the active node to the second node and initiating the application on the second node in response to sniffing a failure in the execution of the application on the active node. | 08-23-2012 |
20120297377 | METHOD, SERVER AND SYSTEM FOR CONVERGING DESKTOP APPLICATION AND WEB APPLICATION - A method, Web server and computer system are provided for converging a desktop application and a Web application. The method includes in response to a request from a client user for using a target desktop application, starting a desktop application initialization process on the Web server and determining an appropriate corresponding hosting server for the user; preparing and provisioning desktop application environment on the corresponding hosting server and starting the target desktop application; transmitting the corresponding hosting server's address to the client so as to make desktop application interaction between the client and the corresponding hosting server; and in response to the completion of the desktop application interaction, stopping and exiting the target desktop application on the corresponding hosting server. The client user is provided with a unified Web console for accessing desktop applications and Web applications, and Web files are shared between the desktop applications and the Web applications. | 11-22-2012 |
20130024551 | ENABLING CLUSTER SCALING - Embodiments of the present invention relate to methods and apparatuses for enabling cluster scaling. Specifically, there is disclosed a method of recording a context of configuration for an initial node of a cluster, comprising: retrieving at least one file to be used for configuring the initial node; and recording a context while configuring the initial node using the at least one file, the recorded context being information on the configuration of the initial node and to be used for enabling addition of a new node into the cluster. There is also disclosed a method of enabling addition of a new node into a cluster. Corresponding apparatuses are also disclosed. According to embodiments of the present invention, the efficiency of improving cluster scaling may be effectively improved. | 01-24-2013 |
20130024554 | ENABLING CLUSTER SCALING - Embodiments of the present invention relate to methods and apparatuses for enabling cluster scaling. Specifically, there is disclosed a method of recording a context of configuration for an initial node of a cluster, comprising: retrieving at least one file to be used for configuring the initial node; and recording a context while configuring the initial node using the at least one file, the recorded context being information on the configuration of the initial node and to be used for enabling addition of a new node into the cluster. There is also disclosed a method of enabling addition of a new node into a cluster. Corresponding apparatuses are also disclosed. According to embodiments of the present invention, the efficiency of improving cluster scaling may be effectively improved. | 01-24-2013 |
20130055034 | METHOD AND APPARATUS FOR DETECTING A SUSPECT MEMORY LEAK - A method for determining a suspect memory leak, including: sampling the throughput and memory usage of an application server; based on the sampled throughput, monitoring whether the throughput decrease continually, and based on the sampled memory usage, monitoring whether the memory usage remains stable within a predefined range; in response to a continual decrease of the throughput and the memory usage remaining stable within the predetermined range, determining that the application server is suspected of having a memory leak. Using the solution of the present invention can free an administrator of the burden of artificially identifying suspect servers, can identify a suspect server during runtime and further determine whether it actually has a memory leak. | 02-28-2013 |
20130325906 | PLACING A DATABASE - A method and system for placing database. The method includes: receiving a request of creating a new database; determining whether there is a need to migrate current database among current virtual machines based on resource demand and free resource in the current virtual machines; determining database placement plan based on the resource demand, migration strategy and migration cost associated with the migration strategy in response to whether there is a need to migrate the database; and executing the database placement plan. The invention can help a database service provider to optimize database layout in database provision through database migration. | 12-05-2013 |