Red Hat, Inc. Patent applications |
Patent application number | Title | Published |
20160078073 | SYSTEM AND METHOD FOR CONTENT STORAGE - A system and method of content storage includes a content store for storing a plurality of first content blocks and one or more first indexes, a content manager including one or more first content analyzers, and an interface for receiving access requests for the plurality of first content blocks. Each of the one or more first indexes includes a plurality of first entries for organizing a plurality of second content blocks from the plurality of first content blocks according to a respective organizational structure. Each of the first entries includes a link to a corresponding content block from the plurality of second content blocks. Each of the plurality of content analyzers monitors the plurality of first content blocks for changes and updates a second index from the one or more first indexes based on information associated with the monitored changes. | 03-17-2016 |
20160070744 | SYSTEM AND METHOD FOR READING FILE BLOCKS - A system and method for reading file blocks includes reading an inode associated with the file from the file system, the inode including one or more first block pointers, determining a height of a file tree associated with the file, and determining whether a value of a second block pointer selected from the one or more first block pointers is consistent with the file having been stored using a block allocation pattern. When the value of the second block pointer is consistent with the file having been stored using the block allocation pattern the method further includes pre-fetching a plurality of file blocks based on the block allocation pattern, verifying that the pre-fetched file blocks are consistent with the file tree, and retrieving one or more data blocks of the file. In some examples, the block allocation pattern corresponds to the file being stored in streaming order to consecutively and contiguously located blocks. | 03-10-2016 |
20150347559 | STORAGE CLUSTER DATA SHIFTING - A method performed by a computing system includes creating a graph, wherein nodes of the graph represent data objects of a data storage cluster, wherein edges of the graph represent joins between data objects represented by both nodes of respective edges, wherein node values of the nodes and weights of the edges are based on statistics related to use of the data objects. The method further includes assigning a first subset of the data objects to a relational database storage node within the data storage cluster, the first subset of data objects being represented by nodes within a cluster of the graph, and assigning a second subset of the data objects to a non-relational database storage node within the data storage cluster, the second subset of data objects being represented by nodes within the graph that are not part of a cluster. | 12-03-2015 |
20150347272 | NATIVE JAVA BACKTRACING FROM THE C/C++ RUNTIME - A system and method are disclosed for runtime probing of software. In accordance with one embodiment, a target method of a software application is modified to include a call to a first helper method and a call to a second helper method that occurs after the call to the first helper method. The first helper method collects runtime information, and at least one of the first helper method or the second helper method passes data comprising the runtime information to a native method that provides the data to a software tool (e.g., a performance monitoring tool, a debugger, etc.). The modified target method is then executed within a virtual machine | 12-03-2015 |
20150347240 | USING AN OBJECT RETAIN BLOCK IN A VIRTUAL MACHINE - A method for using a retain block in application code executing on a virtual machine includes identifying an instruction in application code, the instruction pertaining to an object, determining the instruction is part of a retain block, prior to executing the instruction, determining whether the instruction is to cause the object to be modified, and when the instruction is to cause the object to be modified, storing data indicating a first state of the object in a retain block store and causing the first state of the object to be modified using a second state. Also, the method includes in response to an error occurring during an execution of the instruction, returning the object from the second state to the first state using the stored data. | 12-03-2015 |
20150347167 | Setup of Management System in a Virtualization System - Implementations for setup of management system in a virtualization system are disclosed. A method of the disclosure includes installing, by a setup program of a host machine, a virtual machine (VM) on the host machine in view of configuration information obtained by the setup program, verifying that an operating system (OS) is installed on the VM, verifying that a management system is installed on the VM, confirming that the management system is responsive, when responsiveness of the management system is confirmed, sending a command to the management system to add the host machine to a list of host machines associated with the management system, and restarting the VM when a confirmation that the host machine is added to the list of the management system is received from the management system, wherein the management system is to manage the VM and one or more other VMs of the host machine. | 12-03-2015 |
20150331812 | INPUT/OUTPUT (I/O) PROCESSING VIA A PAGE FAULT DOORBELL MECHANISM - Systems and methods are disclosed for processing an input/output (I/O) operation. An example system includes a kernel interface that receives a notification of a page fault. The page fault is responsive to an application attempting to perform an operation on a memory region that is set to a first access mode. When the memory region is set to the first access mode, the application does not have permission to perform the operation on the memory region. The system also includes a handler that responsive to the notification (i) sets the memory region to a second access mode and (ii) spawns a kernel thread to drain data from the memory region. When the memory region is set to the second access mode, the application has permission to perform the operation on the memory region. The system further includes an I/O module that stores the data in the memory region for processing. | 11-19-2015 |
20150310067 | METHOD AND SYSTEM FOR PROVIDING SECURITY IN A DATA FEDERATION SYSTEM - An example method of controlling access to data stored in a plurality of autonomous data sources includes receiving a federated query including a plurality of source queries. The method also includes receiving a request to submit a source query to a target data source. The method further includes determining whether the request matches at least one rule stored in a rules database. A rule that includes a given query matches a request that includes the given query. The method also includes when it is determined that the request does not match a rule stored in the rules database, sending a communication to cause (i) the source query to be submitted to the data source, and (ii) an initial result of the source query to be masked. The initial result of the source query has the same structure as the masked result of the source query. | 10-29-2015 |
20150295824 | Routing Tier for Highly-Available Applications on a Multi-Tenant Platform-as-a-Service (PaaS) System - Implementations of a routing tier for highly-available applications on a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the disclosure includes receiving, from a broker of a multi-tenant PaaS system, information related to a load balancer gear of an application running on the multi-tenant PaaS system. The information includes endpoint information indicating a location of the load balancer gear, and cartridge information identifying one or more cartridges implemented on the load balancer gear. The method further includes updating a routing table in view of the endpoint information and the cartridge information, and causing traffic to be routed to the load balancer gear in view of the updated routing table. The load balancer gear directs traffic to one or more other gears of the application. | 10-15-2015 |
20150286496 | SYSTEMS AND METHODS FOR ENLISTING SINGLE PHASE COMMIT RESOURCES IN A TWO PHASE COMMIT TRANSACTION - Systems and methods are provided for enlisting single phase commit resources in a two phase commit transaction. An exemplary method includes accessing a global transaction having a plurality of processes requiring single phase commit (1PC) resource and a two phase commit (2PC) resource, initializing a 1PC resource manager for the 1PC resource with a first process of the plurality of processes, wherein the first process requires the 1PC resource, preparing a 2PC resource manager for the 2PC resource with a second process of the plurality of processes, wherein the second process requires the 2PC resource, generating a unique identifier for the 1PC resource, transmitting the unique identifier to the 1PC resource manager, and instructing the 1PC resource manager to commit the first process to the 1PC resource, wherein committing the first process to the 1PC resource comprises recording the unique identifier to the 1PC resource. | 10-08-2015 |
20150278825 | BEHAVIOR ADJUSTMENT BASED ON CAPABILITIES OF A DOWNSTREAM SERVER - Systems, methods, and techniques are disclosed for controlling access to a subscription. An example method includes receiving a set of capabilities of a downstream server and storing the set of capabilities in a distributor record. The distributor record is a representation of the downstream server and includes the set of capabilities and a set of subscriptions assigned to the distributor record. The method also includes receiving a request to assign a subscription to the distributor record. The subscription is subject to a licensing agreement. The method further includes determining, based on the set of capabilities, whether the downstream server has the capability to enforce the licensing agreement. The method also includes when the downstream server is determined to have the capability to enforce the licensing agreement, assigning the subscription to the distributor record. | 10-01-2015 |
20150269214 | IDENTIFYING FILES IN CHANGE LOGS USING FILE CONTENT LOCATION IDENTIFIERS - Systems and methods for identifying files in change logs using file content location identifiers. An example method may comprise: detecting a file system operation associated with a file; and creating a change log record comprising an identifier of a first data structure referencing a first physical location of contents of the file before the file system operation, and an identifier of a second data structure referencing a second physical location of the contents of the file after the file system operation. | 09-24-2015 |
20150269213 | COMPACTING CHANGE LOGS USING FILE CONTENT LOCATION IDENTIFIERS - Systems and methods for compacting change logs using file content location identifiers. An example method may comprise: identifying a first change log record comprising an identifier of a first data structure referencing a first physical location of contents of a file before a first file system operation, the first change log record further comprising an identifier of a second data structure referencing a second physical location of the contents of the file after the file first system operation; identifying a second change log record comprising the identifier of the second data structure referencing the second physical location of the contents of the file before a second file system operation, the second change log record further comprising an identifier of a third data structure referencing a third physical location of the contents of the file after the second file system operation; and replacing the first change log record and the second change log record with a third change log record comprising the identifier of the first data structure and the identifier of the third data structure. | 09-24-2015 |
20150269183 | FILE REPLICATION USING FILE CONTENT LOCATION IDENTIFIERS - Systems and methods for file replication using file content location identifiers. An example method may comprise: receiving an identifier of a data structure associated with a file residing on a first file server, the data structure referencing a physical location of the contents of the file; identifying a file system operation to be performed with respect to a replica of the file residing on a second file server; and performing the file system operation by accessing the replica of the file using a file name alias comprising the identifier of the data structure. | 09-24-2015 |
20150249703 | SYSTEMS AND METHODS FOR COMMUNICATING INFORMATION OF PARTICIPANTS REGISTERED WITH A SUB-COORDINATOR DURING DISTRIBUTED TRANSACTION PROCESSING - Systems and methods are provided for prepare list communication to participants in a two-phase commit protocol transaction processing. An exemplary method includes receiving a distributed transaction for processing, wherein the processing uses a two-phase commit protocol, receiving a distributed transaction comprising a plurality of processes for processing, wherein the processing uses a two-phase commit protocol and preparing, by a main coordinator, at least one participating processing node from the plurality of processes, wherein the at least one participating processing node comprises a first sub-coordinator and a first participant, and wherein the first participant executes a first process of the plurality of processes. The method further includes receiving, by the main coordinator, a first list comprising the first participant registered with the first sub-coordinator. The method may further include contacting, by the main coordinator, the first participant using the first list, in the event of system or first sub-coordinator failure. | 09-03-2015 |
20150248631 | SYSTEMS AND METHODS FOR INTELLIGENT BATCH PROCESSING OF BUSINESS EVENTS - Systems and methods are provided for intelligent batch processing of business events. An exemplary method includes accessing a business process having a plurality of events for execution, determining, using one or more hardware processors, a batch group for processing comprising at least one of the plurality of events, wherein the batch group is determined using a time delay for collecting the at least one of the plurality of events to determine the batch group, and submitting the batch group for processing the at least one of the plurality of events. The method may further include processing the batch group as a first transaction. Processing the first transaction may include determining a resource required by the at least one of the plurality of events and attempting to lock the resource for use during the processing the batch group. | 09-03-2015 |
20150248434 | DELAYED ASYNCHRONOUS FILE REPLICATION IN A DISTRIBUTED FILE SYSTEM - Delayed asynchronous file replication in a distributed file system is described. A first server receives requests to perform a updates to a first replica of a file. The first server sends, to a second server, an outcast instruction to set a second replica of the file to an out-of-date state. The first server performs the updates to the first replica without sending the updates to the second server. The first server receives a request for updates for the second replica from the second server. The first server transmits the updates to the second server to facilitate a heal operation of the second replica, where completion of the heal operation causes the out-of-date state of the second replica to be changed to an up-to-date state. | 09-03-2015 |
20150248404 | DATABASE SCHEMA MIGRATION - Various example embodiments are directed to systems and methods for migrating a database from a source database having a source schema to a target database having a target schema. For example, a computing device may identify a first source schema table associated with a first migration instruction. The first migration instruction may comprise a plurality of migration instruction sets. Each of the plurality of migration instruction sets may correspond to a version of the first source schema table. The computing device may determine that there is a match between the first source schema table and a first migration instruction set and may execute the first migration instruction set. Executing the first migration instruction set may comprise selecting at least one column of the first source schema table and writing the at least one column of the first source schema table to a first target schema table. | 09-03-2015 |
20150248403 | DATABASE SCHEMA MIGRATION - Various example embodiments are directed to systems and methods for migrating a database from a source database having a source schema to a target database having a target schema. For example the migrating may comprise a pre-migration phase and a migration phase. The pre-migration phase may comprise either executing a pre-migration command to modify at least a portion of the source database or generating a pre-migration object at the source database. The migration phase may comprise selecting at least one column from the source database that was modified during the pre-migration phase and writing the at least one column to the target database. | 09-03-2015 |
20150248361 | MEMORY DISTRIBUTION ACROSS MULTIPLE NON-UNIFORM MEMORY ACCESS NODES - A system, methods, and apparatus for determining memory distribution across multiple non-uniform memory access processing nodes are disclosed. An apparatus includes processing nodes, each including processing units and main memory serving as local memory. A bus connects the processing units of each processing node to different main memory of a different processing node as shared memory. Access to local memory has lower memory access latency than access to shared memory. The processing nodes execute threads distributed across the processing nodes, and detect memory accesses made from each processing node for each thread. The processing nodes determine locality values for the thread that represent the fraction of memory accesses made from the processing nodes, and determine processing time values for the threads for a sampling period. The processing nodes determine weighted locality values for the threads, and determine a memory distribution across the processing nodes based on the weighted locality values. | 09-03-2015 |
20150248309 | SYSTEMS AND METHODS FOR PREPARE LIST COMMUNICATION TO PARTICIPANTS IN TWO-PHASE COMMIT PROTOCOL TRANSACTION PROCESSING - Systems and methods are provided for prepare list communication to participants in a two-phase commit protocol transaction processing. An exemplary method includes receiving a distributed transaction for processing, wherein the processing uses a two-phase commit protocol, preparing a first participating node comprising a first process of the distributed transaction, and preparing a second participating node comprising a second process of the distributed transaction. The method further includes determining whether the first participating node can commit the first process and transmitting the determination the first participating node can commit the first process to the second participating node. The first participating node and the second participating node may determine a coordinator of the distributed transaction has failed and the second participating node may use the determination to query the first participating node for a transaction outcome, such as a commit of fail state. | 09-03-2015 |
20150248308 | SYSTEMS AND METHODS FOR SEMI-DURABLE TRANSACTION LOG STORAGE IN TWO-PHASE COMMIT PROTOCOL TRANSACTION PROCESSING - Systems and methods are provided for semi-durable transaction log storage in a two-phase commit protocol transaction processing. An exemplary method includes receiving a distributed transaction comprising a plurality of processes for processing, wherein the processing uses a two-phase commit protocol and preparing, by a main coordinator, at least one participant comprising at least one of the plurality of processes to prepare for execution by the at least one participant. The method further includes receiving, by the main coordinator, information comprising prepared processes of the at least one of the plurality of processes and storing, by the main coordinator, a transaction log comprising the at least one participant and the information to a semi-durable storage. The semi-durable storage may comprise a crash-proof storage that survives system failure. Thus, the semi-durable storage may write the transaction log to the durable storage if there is a system failure. | 09-03-2015 |
20150244802 | IMPORTING AND EXPORTING VIRTUAL DISK IMAGES - A processing device receives a first command to export a first virtual image to a server, wherein the first virtual disk image comprises a plurality of volumes that comprise a read-only base volume and at least one additional volume that comprises changes to the base volume. The processing device generates a map of the first virtual disk image, wherein the map identifies, for each offset in the first virtual disk image, which of the plurality of volumes contains most recent data for the offset. The processing device uses the map to read data at offsets of the virtual disk image from the plurality of volumes. The processing device transmits the data to the server. | 08-27-2015 |
20150244616 | ROUTING A MESSAGE IN A DYNAMIC SERVICE MESH - An example method for routing a message in a dynamic service mesh includes receiving at a mesh point a first message from a sender service and determining, based on a routing table, whether the mesh point has previously received a second message from the sender service. When the mesh point is determined to not have received the second message from the sender service, the first message is routed to a target service in the dynamic service mesh. The method includes receiving an indication of whether the first message has been accepted by the target service and updating the routing table based on the indication. When the indication indicates that the first message has been rejected by the target service, the first message is routed from the mesh point to a second target service. | 08-27-2015 |
20150244574 | OFFLOADING TO A NETWORK INTERFACE CARD - A processing device sends a set of executable instructions to a network interface controller (NIC). The processing device accesses a report generated by the NIC after the NIC has executed at least one instruction from the set of executable instructions. | 08-27-2015 |
20150244573 | NETWORK INTERFACE CARD OFFLOADING - A network interface controller (NIC) executes a set of instructions with respect to received data communications packet and generates output data associated with the execution of the set of instructions. The NIC stores the output data in a location that is accessible to an operating system. | 08-27-2015 |
20150244569 | UNIFIED AND PERSISTENT NETWORK CONFIGURATION - A system and a method are disclosed to configure networking components, including in response to a first configuration command, creating a running configuration for a host computer, saving the running configuration in a configuration file stored in a temporary directory, and in response to receiving a second configuration command to make the running configuration persistent, copying the configuration file to a persistent directory. | 08-27-2015 |
20150244511 | DUPLEX SERVICES RESIDING IN A MESSAGING BUS - An example method of integrating a plurality of heterogeneous peer-to-peer communication participants includes retrieving from a first input queue coupled to a duplex service a first message. The first message includes a message identifier and is from a sender. The method also includes applying a first operation on the first message, determining a first output of the first message based on the first operation, and sending the first output of the first message to a target. The method further includes retrieving from a second input queue coupled to the duplex service a second message. The second message includes the message identifier and is from a target. The method also includes applying a second operation on the second message, determining a second output of the second message based on the second operation, and sending the second output of the second message to the sender. | 08-27-2015 |
20150242464 | SOURCE QUERY CACHING AS FAULT PREVENTION FOR FEDERATED QUERIES - An example system for processing a federated query includes a query proxy that receives a federated query including a plurality of source queries and receives an indication that a failed set of one or more source queries failed to execute successfully. Each source query is specific to an autonomous data source belonging to a federation. The system also includes a data federation engine that identifies a plurality of autonomous data sources to which to send the plurality of source queries. The plurality of autonomous data sources belong to the federation. The system further includes a query fail analyzer that updates a data structure to reflect the unsuccessful execution of one or more source queries of the failed set. | 08-27-2015 |
20150242282 | MECHANISM TO UPDATE SOFTWARE PACKAGES - A system and a method are disclosed, including in response to a request to upgrade software stored in a file system, creating, by a processing device, a first snapshot of a file system, responsive to receiving a rollback request, creating a second snapshot of the file system, and rolling back the file system using the first snapshot. | 08-27-2015 |
20150242224 | DISK RESIZE OF A VIRTUAL MACHINE - An engine in a virtualization system may determine that a disk size of a disk represented by a virtual machine disk image is to be changed. In response, the engine determines whether a host is using the virtual machine disk image to run a virtual machine and also determines a file format of the virtual machine disk image. Based on the determination, the engine sends a request to change the disk size to a requested size to the host running the virtual machine or to a storage pool manager. | 08-27-2015 |
20150242199 | Deployment Optimization for Activation of Scaled Applications in a Multi-Tenant Platform-as-a-Service (PaaS) System - A mechanism for optimization of deployment of applications for activation in a multi-tenant Platform-as-Service (PaaS) system is disclosed. A method of the disclosure includes receiving, by a processing device, a request for deployment of an application source code on a node. The node is provided by the PaaS system. The method also includes implementing, by the processing device, a build, prepare and distribute functionality to convert the application source code into a build result prepared for distribution as a deployment artifact code. The method further includes implementing, by the processing device, a deployment functionality to activate the deployment artifact for the deployment in the node by not incurring downtime. | 08-27-2015 |
20150242197 | Automatic Installing and Scaling of Application Resources in a Multi-Tenant Platform-as-a-Service (PaaS) System - A mechanism for automatic installing and scaling of application resources in a multi-tenant Platform-as-a-Service (PaaS) environment in a cloud computing system is disclosed. A method includes creating, by a processing device of an Infrastructure-as-a-Service (IaaS) platform, an image package corresponding to a node host on a multi-tenant Platform-as-a-Service (PaaS) system. The image package comprises an image file including a script file having a plurality of software updates and run time configuration files. The image package is stored in a storage memory of the IaaS platform and is accessible by a virtual machine (VM) instance. The method also includes retrieving, from the storage memory, the script file from the image package and causing a boot process of the VM instance to download the script file into the PaaS system. | 08-27-2015 |
20150237464 | SYSTEMS AND METHODS FOR DELAYING SOCIAL MEDIA SHARING BASED ON A BROADCAST MEDIA TRANSMISSION - Systems and methods are provided for delaying social media sharing based on a broadcast media transmission. An exemplary method includes determining a location of a user and associating the location of the user with an event occurring at the location. The method further includes accessing a social media content from a social networking account of the user, verifying the social media content comprises time sensitive content corresponding to the event, and applying a delay to distribution of the social media content based on the time sensitive content. The time sensitive content may include content occurring before a broadcast of broadcaster media content corresponding to the event. The method may include receiving the broadcaster media content and determining the delay using the broadcaster media content, or the method may include receiving a broadcaster delay for the broadcaster media content for use as the delay. | 08-20-2015 |
20150237114 | Geographic Placement of Application Components by a Multi-Tenant Platform-as-a-Service (PaaS) System - Implementations for geographic placement of application components by a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the disclosure includes providing, by a processing device of a multi-tenant PaaS system, a list of geographic locations to a user of a multi-tenant PaaS system, receiving, by the processing device from the user, a first request to deploy a component of an application corresponding to the user, the first request comprising a selection of one of the geographic locations from the list, and communicating, by the processing device, a second request to deploy the component of the application, the second request directed to a messaging server dedicated to the selected geographic location of the user, the dedicated messaging server of the selected geographic location to handle a configuration of a node in the selected geographic location for the component of the application. | 08-20-2015 |
20150237025 | STORING A KEY TO AN ENCRYPTED FILE IN KERNEL MEMORY - Storing a key to an encrypted file in a kernel memory is disclosed. Authentication data may be received and authentication credentials of the authentication data may be stored in a file. The file may be encrypted and a key to the encrypted file may be generated. The encrypted file may be stored in a user space and the key may be stored in a kernel space. The key may be retrieved from the kernel space and applied to the encrypted file in the user space to decode the encrypted file and subsequently access the authentication credentials stored in the encrypted file. | 08-20-2015 |
20150234667 | DEFINING CLASSES AS SINGLETON CLASSES OR NON-SINGLETON CLASSES - One or more of the classes is defined using an attribute or keyword that indicates that the one or more classes may be defined as singleton classes or non-singleton classes (a class that may be instantiated more than once). A compiler system converts the class to a singleton class when the compiler system receives a command or request indicating that the class is to be defined as a singleton class. Various optimizations may be performed when one or more of the classes in the source code are defined as singleton classes. The compiler system may not convert the class to a singleton class when the compiler system receives a command or request indicating that the class is to be defined as a non-singleton class. | 08-20-2015 |
20150234643 | IDENTIFYING SINGLETON CLASSES - A compiler system analyzes source code for an application. The compiler system determines whether a class in the source code uses a singleton pattern even though the class is not defined as singleton class. The compiler system may optionally convert the class to a singleton class. The compiler system may also perform one or more optimizations when generating the application based on the source code. | 08-20-2015 |
20150227537 | NON-UNIFORM FILE ACCESS IN A DISTRIBUTED FILE SYSTEM - Data connections from a remote login session are identified and an identification query may be transmitted by the remote login session to endpoints (e.g., servers) of the data connections. In response to the identification query, identification information may be received from the endpoints. Furthermore, the identification information may be compared with a local identification of a local server that hosts the remote login session. A file created by the remote login session may be stored at an endpoint over a data connection where the local identification matches a portion or all of the identification information of the endpoint of the data connection. | 08-13-2015 |
20150227535 | CASELESS FILE LOOKUP IN A DISTRIBUTED FILE SYSTEM - A caseless file lookup in a distributed file system is disclosed. A request to store a file in a volume may be received. In response to the request, the type of client system issuing the request may be identified. Based on the type of client system that has been identified, a first hash value or a second hash value may be calculated for the name of the file to generate and assign a hash value to the file. The file may be stored in a storage resource based on the first or second hash value that has been generated for the file. | 08-13-2015 |
20150227350 | MULTI-DIMENSIONAL, MULTI-CONFIGURATION COMPILATION PHASE OUTPUT VISUALIZATION TECHNIQUE - Systems and methods of providing a visual output of a compilation phase is provided. An example method includes receiving input source code for compilation by a compiler and displaying a multi-dimensional coordinate system including first and second axes. The method also includes providing a first user interface object associated with the first axis and providing a second user interface object associated with the second axis. The first user interface object enables a user to select one or more compilation phases, and the second user interface object enables the user to select one or more compiler versions. The method further includes receiving via the first user interface object a user selection of a compilation phase and obtaining an output of the input source code compiled in accordance with the selected compilation phase. The method further includes displaying the output between two axes of the multi-dimensional coordinate system. | 08-13-2015 |
20150220725 | SINGLE LOGIN MULTIPLEXING - A method and system for providing access to application, where an association of a plurality of passwords with a login for an account of an application is maintained, wherein each of the plurality of passwords has a corresponding user and a corresponding set of privileges. A request for access to the account is received from a first user including the login and a first password of the plurality of password corresponding to the user, and the user is authenticated in view of the login and the password. Upon authentication of the user, access to the account is granted for the user to execute a corresponding first set of privileges. | 08-06-2015 |
20150215209 | MULTIPLE ACTIVE LINK AGGREGATORS - A computing device identifies a plurality of network interface controllers (NICs) of a computing device that are available for link aggregation. The computing device establishes a first link aggregator for a first set of the plurality of NICs and a second link aggregator for a second set of the plurality of NICs. The computing device activates the first link aggregator. The computing device activates the second link aggregator while maintaining the first link aggregator active to cause the first link aggregator and the second link aggregator to simultaneously handle network communications. | 07-30-2015 |
20150215128 | MOBILE DEVICE USER STRONG AUTHENTICATION FOR ACCESSING PROTECTED NETWORK RESOURCES - Systems and methods for strong user authentication for accessing protected applications by mobile computing devices. An example method may comprise: receiving, by a mobile computing device, a cryptographic nonce via a first communication interface; transmitting, via a second communication interface, an authentication request using the cryptographic nonce, to an authentication server via an HTTP proxy server; receiving a resource access token from the authentication server; and transmitting a computing resource access request using the resource access token. | 07-30-2015 |
20150212940 | Identifying Performance Limiting Internode Data Sharing on NUMA Platforms - Methods, systems, and computer program products for identifying performance limiting internode data sharing on Non-Uniform Memory Access (NUMA) platforms are provided. A computer-implemented method may include receiving event records collected by a performance monitoring unit (PMU) during event tracing, associating the event records with corresponding operating system information observed during the event tracing, analyzing the event records to identify shared cache line utilization, and generating a shared cache line utilization report in view of the analyzing. | 07-30-2015 |
20150212850 | USING COMPENSATION TRANSACTIONS FOR MULTIPLE ONE-PHASE COMMIT PARTICIPANTS - An example system includes a registration engine that receives a request to register with a transaction. The request is from a one-phase commit resource manager. The example system also includes a proxy instantiation engine that determines whether a list of registered participants of the transaction includes at least one one-phase commit resource manager. When the list of registered participants is determined to include at least one one-phase commit resource manager, the proxy instantiation engine: (i) creates a proxy for the one-phase commit resource manager, and (2) adds the proxy to the list of registered participants. The proxy supports a prepare operation, commit operation, and abort operation. The system further includes a first-phase coordinator that sends a commit query to each registered two-phase commit participant included in the list. The commit query requests an indication of whether the respective participant can commit the transaction. | 07-30-2015 |
20150207875 | DISTRIBUTED COORDINATED SNAPSHOTS - A management process coordinates a number of servers to create a crash-consistent distributed snapshot. The management process instructs the servers to enter an ambiguity mode in which acknowledgement of barrier operations is delayed, instructs the servers to generate portion snapshots, and instructs the servers to exit the ambiguity mode and acknowledge barrier operations. | 07-23-2015 |
20150205818 | TIERED DISTRIBUTED STORAGE POLICIES - A processing device identifies a file (or data block) and selects a storage location for the file based on a plurality of data distribution policies. To select the storage location, the processing device applies, at a top distribution layer, a first data distribution policy to select a first storage pool from a plurality of storage pools based on a first storage criterion. The processing device then applies, at a bottom distribution layer, a second data distribution policy associated with the first storage pool to select a first storage node from a plurality of storage nodes in the first storage pool based on a second storage criterion. The processing device stores at least a portion of the file in the first storage node of the first storage pool. | 07-23-2015 |
20150205634 | Resilient Scheduling of Broker Jobs for Asynchronous Tasks in a Multi-Tenant Platform-as-a-Service (PaaS) System - Implementations for resilient scheduling of broker jobs for asynchronous tasks in a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the disclosure includes receiving, by the processing device of a broker of a multi-tenant PaaS system from a user of the multi-tenant PaaS system, a request to complete a job, adding, by the processing device, an entry corresponding to the requested job in a data store of the broker, adding, by the processing device, another entry corresponding to the requested job in a scheduler communicably coupled to the broker, and sending, by the processing device to the user, an acknowledgment of the request and an identifier (ID) of the job, wherein the job is processed asynchronous to the sending of the acknowledgment. | 07-23-2015 |
20150205610 | CONFIGURING MANAGED SYSTEMS USING ABSTRACTED FUNCTIONS - Systems and methods for configuring managed systems using abstracted functions. An example method may include: receiving a command corresponding to one or more instructions in a defined protocol, the instructions being directed to a first system and a second system, processing the command to generate the instructions, configuring a first instance of the one or more instructions with respect to the first system, configuring a second instance of the one or more instructions with respect to the second system, determining, with the processing device, an execution efficiency metric with respect to the first instance of the one or more instructions and the second instance of the one or more instructions, and providing, in view of the execution efficiency metric, at least one of the first instance of the one or more instructions to the first system or the second instance of the one or more instructions to the second system. | 07-23-2015 |
20150199787 | DISTRIBUTE WORKLOAD OF AN APPLICATION TO A GRAPHICS PROCESSING UNIT - Systems, methods, and techniques of distributing a workload of an application to a GPU are provided. An example method includes obtaining an intermediate representation of a source code portion of an application and compiling the intermediate representation into a set of instructions that is native to the GPU. The set of instructions includes a binary representation of the source code portion executable on the GPU, and execution of the set of instructions on the GPU includes processing a workload of the application. The method also includes transforming data associated with the source code portion into one or more data types native to the GPU and sending to the GPU a communication including the set of instructions executable on the GPU and the one or more data types native to the GPU. | 07-16-2015 |
20150199747 | ASSOCIATING INTERDEPENDENT SUBSCRIPTIONS - Implementations for associating stackable subscriptions with varying attribute coverage are disclosed. In one example, the method includes receiving a fulfillment requirement associated with a computing system, selecting a first product subscription from a plurality of product subscriptions in a data store, determining whether the first product subscription partially satisfies the fulfillment requirement, selecting a second product subscription from the plurality of product subscriptions when the first product subscription partially satisfies the fulfillment requirement, determining whether an addition of the second product subscription to the first product subscription satisfies the fulfillment requirement, and associating the first and second product subscriptions with the computing system when the addition of the second product subscription to the first product subscription satisfies the fulfillment requirement. | 07-16-2015 |
20150199404 | SYSTEM AND METHOD FOR BATCH QUERY PROCESSING - A system and method of batch query processing includes accumulating data queries in a query holding area of a query assistant running in a computer server, separating the accumulated data queries into a plurality of partitions, ordering the partitions, ordering the accumulated data queries within each of the partitions, and processing the accumulated data queries in an order based on the ordering of the partitions and the ordering of the data queries within each of the partitions. Each of the partitions includes data queries with a respective from-type. Each respective from-type is associated with a combination of storage tables accessed by each of the data queries in a corresponding partition. In some examples, ordering the accumulated data queries within each of the partitions includes processing the data queries in each partition against a test data set and ordering the data queries based on results of the processing. | 07-16-2015 |
20150195377 | CONDITIONAL REQUEST PROCESSING - A method and system for processing a request is provided. An example system includes a security module that authenticates a request from a client. The system also includes a Web service that determines whether the set of operations includes an input/output (I/O) operation and determines whether a result of the authentication has been determined. While the request is pending authentication, the Web service may initiate processing of the request and may ensure that no I/O operations are performed within the processing of the request until a request of the authentication has been determined. | 07-09-2015 |
20150195337 | Downloadable Cartridges for a Multi-Tenant Platform-as-a-Service (PaaS) System - Implementations for downloadable cartridges for a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the disclosure includes receiving, by a processing device of a multi-tenant Platform-as-a-Service (PaaS) system, a location of a cartridge manifest corresponding to a cartridge that is maintained outside of the multi-tenant PaaS system, downloading the cartridge manifest from the received location, parsing the downloaded cartridge manifest to determine a source location of files of the cartridge, the source location separate from the multi-tenant PaaS system, and causing the files of the cartridge to be obtained from the determined source location for use by at least one node of the multi-tenant PaaS system that is hosting an application requesting the cartridge. | 07-09-2015 |
20150195138 | Cloud-Based Service Resource Provisioning Based on Network Characteristics - Provisioning a resource to provide a service based on network characteristics is disclosed. A request for a service may be received and network characteristics of current resources providing the service may be identified. If the network characteristics do not satisfy a load policy, a new resource is provisioned to provide the service. The location of the new resource may subsequently be transmitted. If the network characteristics do satisfy the load policy, then one of the current resources may be used to provide the service in response to the request. | 07-09-2015 |
20150193541 | QUERY DATA SPLITTING - Implementations for query data splitting are disclosed. In one example, the method includes receiving, by a processing device, a first query and a second query, determining that the second query is a subset of the first query, determining a first set of attributes associated with the first query and a second set of attributes associated with the second query, and determining, by the processing device, whether to submit the second query or the first query to a database in view of the first set of attributes and the second set of attributes. | 07-09-2015 |
20150193481 | Installation and Update of Cartridges in a Multi-Tenant Platform-as-a-Service (PaaS) System - Implementations for installation and update of cartridges in a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the disclosure includes receiving, by a processing device of a node of a multi-tenant PaaS system, an indication to initiate an update process for cartridges of the node, receiving a cartridge file package for storage at the node, storing the cartridge file package to a cartridge library of the node, and maintaining the cartridge file package in the cartridge library as a newest version of a template cartridge that corresponds to the cartridge file package. | 07-09-2015 |
20150193452 | Locked Files for Cartridges in a Multi-Tenant Platform-as-a-Service (PaaS) System - Implementations for locked files for cartridges in a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the disclosure includes identifying, by a processing device of a multi-tenant Platform-a-a-Service (PaaS) system, an operation requested to be performed by the multi-tenant PaaS system, determining access contexts for the identified operation with respect to a cartridge associated with the operation, the access context comprising a user or component that is attempting to access a file of the cartridge for the identified operation, accessing a locked files manifest of the cartridge, the locked files manifest identifying at least one of files or directories of the cartridge to which a cartridge author of the cartridge restricts access to application developers utilizing the cartridge to execute an application, and applying access permissions to the cartridge according to the determined access contexts and the locked files manifest. | 07-09-2015 |
20150193343 | CACHE SYSTEM WITH MULTIPLE CACHE UNIT STATES - A cache system stores a number of different datasets. The cache system includes a number of cache units, each in a state associated with one of the datasets. In response to determining that a hit ratio of a cache unit drops below a threshold, the state of the cache unit is changed and the dataset is replaced with that associated with the new state. | 07-09-2015 |
20150193329 | Bug Reporting and Communication - A method for software bug resolution includes generating, with a software bug reporting client module, a software bug report for a bug, the bug being detected in a piece of software. The method further includes prompting a user to add information about the bug to the software bug report and sending the software bug report to a bug reporting entity to be presented as a post on a feed, the feed associated with the bug reporting entity. The method further includes receiving, from the bug reporting entity, a notification of a response to the post, and pushing, through the software bug reporting client module, the notification to the user. | 07-09-2015 |
20150193324 | Template Directories for Cartridges in a Multi-Tenant Platform-as-a-Service (PaaS) System - Implementations for template directories for cartridges in a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the disclosure includes maintaining, by a node executed by a processing device, a cartridge library comprising cartridge packages that provide functionality for applications executed by the node for a multi-tenant Platform-as-a-Service (PaaS) system, embedding, by the node, a cartridge instance from the cartridge library in a gear of the node, providing, via the cartridge instance, a template directory to an application utilizing the cartridge instance on the node, and executing, by the node, a sample application from the template directory to demonstrate functionality of the cartridge instance to an application developer of the application. | 07-09-2015 |
20150193268 | FILE LOCK AND UNLOCK MECHANISM - A system and a method are disclosed for managing file locks, including initiating, by a processing device executing a kernel, executions of a number of active tasks that each has acquired a respective lock to a record, and in response to release of a first lock to the record by an active task, waking up a previously-designated worker task out of a number of idle tasks, in which the worker task is to attempt an acquisition of a second lock on behalf of at least one remaining task of the idle tasks. | 07-09-2015 |
20150193265 | USING NONSPECULATIVE OPERATIONS FOR LOCK ELISION - A method includes identifying a set of instructions to be executed as a transaction that is to access a section of memory, prior to executing the set of instructions as the transaction, facilitating a non-speculative access to a data cache, the data cache comprising a plurality of cache lines, each cache line comprising a lock to lock a respective portion of the memory, determining if the section of memory is available for the transaction in view of locks of the plurality of cache lines, and in response to a determination that the section of memory is not available, causing the non-speculative access to the data cache to be repeated. | 07-09-2015 |
20150193100 | Intuitive Workspace Management - A method performed by a computer processing system includes associating a first workspace with a first graphical object of a workspace widget, the workspace widget being provided to a user through a graphical user interface (GUI). The method further includes receiving an input from a user to switch to a second workspace, providing the second workspace to the user through the GUI, moving the first graphical object from a first position in the workspace widget to a second position in the workspace widget, adding a second graphical object to the workspace widget at the first position, the second graphical object being associated with the second workspace. | 07-09-2015 |
20150186203 | Applying Security Label on Kernel Core Crash File - A system for applying security label on a kernel core crash file is disclosed. A method of the disclosure includes accessing, by a processing device, a crash recovery configuration file, parsing the crash recovery configuration file to determine a storage location of a core file, the core file comprising an image of a kernel of an operating system (OS), the image being captured when the OS fails, locating the core file at the determined storage location, and upon determining that a security label is not associated with the core file, sending a command to apply the security label to the core file. | 07-02-2015 |
20150186174 | MAC ADDRESS PREFIXES USED ON VIRTUAL MACHINE HOSTS - A hypervisor running on a host machine identifies a first media access control (MAC) address prefix associated with the host machine, wherein the first MAC address prefix comprises one or more bits that are shared by MAC addresses for virtual machines hosted by the host machine. The hypervisor configures the host machine to filter packets based on a first MAC address prefix filter, wherein the first MAC address prefix filter passes packets addressed to MAC addresses that have the identified first MAC address prefix. The hypervisor assigns MAC addresses having the first MAC address prefix to a plurality of virtual machines that will be hosted by the host machine. | 07-02-2015 |
20150178966 | SYSTEM AND METHOD TO CHECK THE CORRECT RENDERING OF A FONT - Systems and methods for determining a correct rendering of a candidate entity are provided. An example method includes identifying a first combined image including an image of a reference entity. The reference entity is bound by a first grid including one or more grid cells. The method further includes rendering a second combined image including an image of a candidate entity. The candidate entity is bound by a second grid including one or more grid cells. The method also includes identifying reference and candidate patterns. The method further includes mapping corresponding grid cell patterns of the reference and candidate entities and determining a variance measurement between the mapped grid cell patterns of the reference and candidate entities. The method also includes determining, based on the variance measurement, whether the candidate entity is a correct rendering in accordance with the reference entity. | 06-25-2015 |
20150178122 | METHOD AND SYSTEM FOR PROVIDING A HIGH-AVAILABILITY APPLICATION - A system, method, and techniques for providing high availability to an application are provided. An example system includes a plurality of databases and a persistence layer that generates, based on a request, one or more sets of database commands that is specific to a database. The system also includes a high-availability layer that is an intermediary between the persistence layer and the plurality of databases, and includes a transaction manager and an execution engine. The transaction manager starts a composite transaction including a sub-transaction corresponding to each database of the plurality of databases and determines whether each applied sub-transaction has successfully completed. A sub-transaction includes a set of database commands. The execution engine applies each sub-transaction to its corresponding database. | 06-25-2015 |
20150178113 | LOADING RUNTIME CONFIGURATION FILES INTO VIRTUAL MACHINE INSTANCES - Systems and methods for loading runtime configuration files into virtual machine instances. An example method may comprise: storing, by a processing device, a plurality of virtual machine configuration files in a storage memory accessible by a virtual machine instance; creating a file list referencing a virtual machine configuration file of the plurality of virtual machine configuration files, the file list further specifying a target location of the virtual machine configuration file in the virtual machine instance; and causing a boot process of the virtual machine instance to download the virtual machine configuration file specified by the file list from the storage memory into the target location specified by the file list. | 06-25-2015 |
20150163222 | STRONG USER AUTHENTICATION FOR ACCESSING PROTECTED NETWORK - Systems and methods for strong user authentication for accessing protected networks. An example method may comprise: transmitting, by a processing device, an authentication request to an authentication server; receiving an access granting token from the authentication server; transmitting, to a nonce server, a nonce request using the access granting token; receiving a cryptographic nonce from the nonce server; and transmitting, to a virtual private network (VPN) server, a VPN connection request using the cryptographic nonce. | 06-11-2015 |
20150163100 | LINK-LAYER LEVEL LINK AGGREGATION AUTOCONFIGURATION - A computing device identifies a plurality of network interface controllers (NICs) that are available for link aggregation. The computing device probes a network using a plurality of protocols to detect a topology of at least one network to which the plurality of NICs are connected. The computing device automatically establishes a link aggregation configuration including one or more of the plurality of NICs based on the determined network topology. | 06-11-2015 |
20150160952 | MANAGING CONFIGURATION STATES IN AN APPLICATION SERVER - A mechanism for managing configuration states in an application server. The method includes saving a plurality of configuration states of an application server. The method also includes selecting a configuration state from the plurality of configuration states in view of a a match of one of a file tuple or a database tuple between the selected configuration state and the plurality of configuration states and data quantity associated with the plurality of configuration states. | 06-11-2015 |
20150156078 | METHOD AND SYSTEM FOR DYNAMICALLY SHIFTING A SERVICE - Systems and methods are disclosed for dynamically shifting one or more instances of a service from a first set of servers to a second set of servers. In an embodiment, a system includes a service repository that stores one or more services. The system also includes a deployment manager that deploys a set of instances of a service of the one or more services on a first set of servers and shifts one or more instances of the set of instances to a second set of servers. | 06-04-2015 |
20150154272 | MANAGING DATA OPERATIONS IN AN INTEGRATED DATABASE SYSTEM - A mechanism for managing data operations in an integrated database system. The method includes receiving a request to perform a data operation and retrieving a data set from a primary data source (PDS) in view of the request. The method also includes storing the data set in a temporary data store (TDS). The method further includes performing the data operation on the stored data set in the TDS. | 06-04-2015 |
20150143266 | MULTIPLE DISPLAY MANAGEMENT - A method and system for managing multiple displays, including receiving a first indication to allow movement of an object between a first display and a second display, allowing movement of the object between the first display and the second display in view of the first indication, receiving a second indication to prevent movement of the object between the first display to the second display, and preventing movement of the object between the first display and the second display in view of the second indication. | 05-21-2015 |
20150142828 | ONTOLOGY BASED CATEGORIZATION OF USERS - Systems and methods are disclosed for categorizing a user. An example method includes marking one or more graphical user interface (GUI) features of an application. The method also includes monitoring a user's usage of the one or more marked GUI features of the application. The method further includes generating one or more user-specific ontologies for the user in accordance with the user's monitored usage. The method also includes comparing the one or more user-specific ontologies with a plurality of defined ontologies. Each defined ontology corresponds to a category of a plurality of categories. The method further includes categorizing the user in accordance with the comparison of the one or more user-specific ontologies and the plurality of defined ontologies. | 05-21-2015 |
20150137944 | PREVENTING THE DISCOVERY OF ACCESS CODES - An example method includes determining a size at which to display one or more keys of a virtual keypad and determining a symbol to display on the one or more keys of the virtual keypad. The method also includes displaying the one or more keys of the virtual keypad on a computing device in accordance with a key's determined size and symbol, where a first displayed key is displayed at a different size than a second displayed key. The method further includes receiving a user input corresponding to the one or more keys and comparing the user input with a sequence of symbols. The method also includes authenticating the user in accordance with the comparison of the user input and sequence of symbols. | 05-21-2015 |
20150135174 | LIGHTWEIGHT SNAPSHOTS FOR VIRTUAL DISKS - A snapshot manager in a virtual machine monitor receives a write request comprising data from a guest operating system of a virtual machine, wherein the write request is directed to a sector of a virtual disk associated with the virtual machine. The snapshot manager writes the data from the guest operating system of the virtual machine to the sector in a base image of the virtual disk, the base image comprising a current version of the virtual disk, wherein the virtual disk comprises the base image and a overlay image, the overlay image comprising a snapshot of the base image at a previous point in time. | 05-14-2015 |
20150135167 | DYNAMIC PER-METHOD PROBING DURING RUNTIME - A system, method, and techniques for dynamically probing a method are provided. An example method includes identifying a target method to probe in an application. The method also includes modifying the target method to include a call to a helper method that passes a rulename to a native method in a shared object library. The native method includes a marker associated with a probe point inserted in the application at a location relative to the target method, and the rulename identifies the marker associated with the probe point. The method further includes during execution of the application on a computing device, detecting when the target method is invoked. The method also includes when the method is invoked, passing the rulename to the native method in the shared object library. | 05-14-2015 |
20150135131 | TEMPORALLY ADJUSTED APPLICATION WINDOW DROP SHADOWS - A method and system for determining a first local time of day for a user device, and determining a first value of a visual aspect of a drop shadow associated with an application window on the display based on of the first local time of day. The drop shadow is displayed in view of the first value, wherein the drop shadow provides a visual appearance that the application window is above a background. A second local time is determined, and a second value of the visual aspect of the drop shadow is determined, wherein the second value is in view of the second local time. The drop shadow is displayed in view of the second value of the aspect such that the drop shadow has a different visual appearance from the first local time to the second local time. | 05-14-2015 |
20150134611 | TRANSFERRING OBJECTS BETWEEN DIFFERENT STORAGE DEVICES BASED ON TIMESTAMPS - A distributed file system includes a plurality of computing devices that are coupled to a plurality of storage devices. A first computing device transfers objects to an additional computing device. The first computing device determines times when multiple computing devices, including the first computing device, transferred objects to the additional computing device. The first computing device identifies the earliest of the times and may store this information on the additional computing devices. A second computing device resumes transferring data to the additional computing device when the first computing device becomes unavailable or inoperable. The second computing device may use the earliest of the times to determine which objects should be transferred to the additional computing device. | 05-14-2015 |
20150127497 | Search Based Content Inventory Comparison - The subject matter of this specification can be implemented in, among other things, a method that includes receiving a selection of content filters for content data that identifies products, packages, and repositories, and receiving a selection of environment filters. The method includes filtering the content data to identify content items in view of the content filters and the environment filters. The content items include one or more of the repositories, the products, or the packages. The method includes causing presentation of a list of the content items, which organizes the content items in view of release environments that are within the content items and repositories that are within the content items. The method includes receiving a selection of repository-environment combinations from the subset of the release environments and the subset of the repositories and causing presentation of a comparison of ones of the packages for each of the repository-environment combinations. | 05-07-2015 |
20150121553 | SYSTEM AND METHOD FOR CODE PROTECTION - Systems, methods, and techniques are disclosed for. An example method of providing code protection includes identifying a set of methods including one or more code portions to extract from an application. The method also includes extracting the one or more code portions from the set of methods. The one or more extracted code portions is executable on a computing device remote from a client. The method further includes inserting an interface into the application. The interface enables the client to remotely execute the one or more extracted code portions. The method also includes transmitting the application including the interface and without the one or more extracted code portions to the client. | 04-30-2015 |
20150121337 | REGULAR EXPRESSION SUPPORT IN INSTRUMENTATION LANGUAGES USING KERNEL-MODE EXECUTABLE CODE - Systems and methods are provided for regular expression support in instrumentation languages using kernel-mode executable code. An example system includes a translator module that receives an input source code including a regular expression in a first source code language, wherein the translator module further determines a matching function in kernel-mode code language corresponding to the regular expression, and wherein the matching function corresponds to deterministic finite automaton. The system further includes a kernel module that processes at least one string using the matching function, wherein the matching function simulates state transitions of the deterministic finite automaton using the at least one string. | 04-30-2015 |
20150120853 | PARALLEL MESSAGE PROCESSING ON DIVERSE MESSAGING BUSES - Systems, methods, and techniques are disclosed for processing messages using a messaging bus. An example system includes an input queue that stores one or more input messages and an output queue that stores one or more output messages. The example system also includes a first service residing in a first messaging bus. In a composite transaction, the first service processes a first message and generates a second message in accordance with processing the first message. The example system further includes a transaction manager that places the second message in the output queue. The second message is routed from the output queue to a second service residing in a second messaging bus for processing, and the first and second messaging buses are diverse. The second service processes, during the composite transaction, the second message. | 04-30-2015 |
20150106572 | SCRIPTED MULTIPROCESS PROBING WITHOUT SYSTEM PRIVILEGE - A controller process loads a module based on a user-generated script into itself. The controller process also generates a shared memory mapping using offset pointers as opposed to absolute pointers. The controller process loads the module and the shared memory mapping into target processes indicated by the user-generated script in order to probe the target processes. | 04-16-2015 |
20150106428 | SYSTEM AND METHOD FOR COLLABORATIVE PROCESSING OF SERVICE REQUESTS - A system and method of collaborative processing of service requests includes receiving a service request at an application server, beginning execution of a proxy member function of a proxy class, and determining whether a movable member function in a movable class is to be executed at a client. When the movable member function is to be executed at the client, the method further includes creating a partial response including code for the movable class and information for invoking the movable member function and transmitting the partial response to the client fore execution of the movable member function. When the movable member function is not to be executed at the client, the method further includes executing the movable member function in the application server and returning a result of the movable member function as a result of the proxy member function. The proxy member function replaces the movable member function. | 04-16-2015 |
20150106422 | SYSTEM AND METHOD FOR SERVER SELECTION USING COMPETITIVE EVALUATION - A system and method of server selection using competitive evaluation includes receiving a service request at an arbiter running on a computing device, determining whether the service request is associated with a preferred server, and forwarding the service request to the preferred server when the service request is associated with the preferred server. When the service request is not associated with the preferred server, the method further includes using the arbiter to coordinate a competitive evaluation among a plurality of active servers, selecting as the preferred server a first one of the active servers that completes processing of the service request first, and associating the preferred server with the service request. The method further includes receiving a response to the service request from the preferred server and returning the response to a client. The service request is received from the client. | 04-16-2015 |
20150106411 | MIGRATING FILE LOCKS IN DISTRIBUTED FILE SYSTEMS - Systems and methods for migrating file locks in distributed file systems. An example method may comprise: receiving, by a file system server, over a first connection initiated by a file system client, a connection identifier comprising a file identifier; identifying, in view of the connection identifier, a second connection initiated by the file system client, the second connection associated with a file lock with respect to a file identified by the file identifier; and associating the file lock with the first connection. | 04-16-2015 |
20150106353 | Data Federation Query Suggestion - Systems and methods are provided for data federation query suggestion. An example system includes a query constraint database including at least one query constraint and a query constraint resolving module that receives from a user a query to search a federated database using a federated database search engine and determines if the query satisfies at least one query constraints. The system further includes a query suggestion module that determines a query suggestion if the query does not satisfy at least one query constraints. | 04-16-2015 |
20150100752 | Concurrent Garbage Collector Thread - An example method of managing memory for an application includes identifying a plurality of regions of a heap storing one or more objects of a first type and one or more objects of a second type. Each object of the second type stores a memory address of an object of the first type. The method also includes selecting a set of target collection regions of the heap. The method includes in a concurrent marking phase, marking one or more reachable objects of the first type as live data. The method further includes for each region of the plurality maintaining a calculation of live data in the respective region. The method also includes traversing the objects of the first type marked in the concurrent marking phase and evacuating a set of traversed objects from a target collection region to a destination region of the heap. | 04-09-2015 |
20150100659 | CACHING MECHANISM FOR DETERMINING VALIDITY OF CACHED DATA USING WEB APPLICATION BUSINESS LOGIC - Systems and methods are provided for a caching mechanism that determines validity of cached data using web application business logic. An example system includes a web container that receives a first request to return one or more generated data located in a data cache, and a web application including one or more data validity arbiters and business logic determining the validity of the one or more generated data. The system may further include a business logic caching mechanism that requests the validity of the one or more generated data from the one or more data validity arbiters, wherein the one or more data validity arbiters utilize the business logic to determine the validity of the one or more generated data. | 04-09-2015 |
20150081996 | PAUSELESS GARBAGE COLLECTOR WRITE BARRIER - An example method of managing memory includes identifying a first object of the first type to update, the first object being stored on a heap. The method also includes reading a first memory address stored in a second object of the second type and storing a copy of the first object at a second memory address. The first memory address is an initial memory address of the first object. The method further includes after the copy is stored, reading a third memory address stored in the second object. The third memory address is a current memory address of the first object. The method also includes determining whether the first memory address matches the third memory address, and when the first memory address is determined to match the third memory address, updating the first memory address stored in the second object with the second memory address. | 03-19-2015 |
20150067390 | LIVE SNAPSHOT OF A VIRTUAL MACHINE - The subject matter of this specification can be implemented in, among other things, a method including receiving a request to create a live snapshot of a state of a virtual machine at a reference point-in-time. The virtual machine can have a memory and an original disk file. The method further includes creating, at the reference point-in-time, an overlay disk file to copy data from the original disk file. Data modifications after the reference point-in-time are performed in the original disk file but not in the overlay disk file. The method also includes creating a memory snapshot at the reference point-in-time. The method includes providing the live snapshot corresponding to the reference point-in-time. The live snapshot includes the overlay disk file and the memory snapshot. | 03-05-2015 |
20150067342 | SYSTEMS AND METHODS FOR EXECUTING COMPLIANCE VERIFICATION OR REMEDIATION SCRIPTS - Systems and methods for executing compliance verification or remediation scripts. An example method may comprise: identifying, by a computer system, a compliance script to be executed; determining a value of a cryptographic hash function of at least part of the identified compliance script; identifying, based on the value of the cryptographic hash function, an installation path of a corresponding digitally signed compliance script pre-installed on the computer system, the digitally signed compliance script associated with a security context; and executing, within the security context, the digitally signed compliance script. | 03-05-2015 |
20150067293 | NON-INTRUSIVE STORAGE OF GARBAGE COLLECTOR-SPECIFIC MANAGEMENT DATA - A system, method, and techniques for managing memory are provided. An example method includes identifying a plurality of regions in a heap storing one or more objects of a first type and one or more objects of a second type. Each object of the first type includes application data and management data, and the management data is used by a managed runtime to manage the application data. The method also includes determining an object of the first type to read and computing, based on a last-known memory address of the object of the first type, a memory address of an object of the second type storing a current memory address of the object of the first type. The method further includes reading the current memory address stored in the object of the second type and locating the object of the first type at the read memory address. | 03-05-2015 |
20150067196 | PORTABLE COMPUTING DEVICE PROVIDING OPERATING SYSTEM FOR HOST DEVICES - A portable computing device detects a connection to a host computing device and receives data from the host computing device identifying at least one of a device type of the host computing device or properties of the host computing device. The portable computing device selects an operating system from a plurality of available operating systems installed on the portable computing device in view of the received data. The portable computing device loads the selected operating system. | 03-05-2015 |
20150067169 | TRACKING COSTS FOR A DEPLOYABLE INSTANCE - A system and method for receiving a request to launch a deployable instance, a resource requirement profile for the deployable instance, different cost model information for each cloud in a pool of clouds, and different capability information for each cloud in the pool of clouds. Selectable clouds in the pool of clouds that meet the resource requirement profile are determined, and a deployment cost is calculated for the deployable instance for each cloud in the pool of clouds based on the resource requirement profile and the cost information. A lowest cost cloud that corresponds to the resource requirement profile for launching the deployable instance is determined from the selectable clouds based on the deployment cost of each selectable cloud. Upon determining the lowest cost cloud that corresponds to the resource requirement profile, the deployable instance can be launched on the lowest cost cloud. | 03-05-2015 |
20150067005 | PATH RESOLVER FOR CLIENT ACCESS TO DISTRIBUTED FILE SYSTEMS - Systems and methods implementing a path resolver facilitating client access to a distributed file system. An example method may comprise: receiving, by a processing device, file identifier comprising a symbolic link; producing, by a user space process being executed by the processing device, a modified file identifier, by replacing a pre-defined sequence of characters within the file identifier by a path to a mount point of a distributed file system; and identifying, in view of the modified file identifier, a data structure comprising information about a file identified by the file identifier. | 03-05-2015 |
20150066859 | MEMORY FIRST LIVE SNAPSHOT - The subject matter of this specification can be implemented in, among other things, a method including receiving a request to create a live snapshot of a state of a virtual machine including a memory and an original disk file. The method further includes copying, by a hypervisor, data from the memory to a storage device to form a memory snapshot. The method further includes pausing the virtual machine and creating a new disk file at a reference point-in-time. The original disk file is a backing file of the new disk file. The method further includes resuming the virtual machine. The virtual machine is to perform disk operations using the new disk file after the reference point-in-time. The method further includes copying the original disk file to a disk snapshot file. The method further includes providing the live snapshot including the disk snapshot file and the memory snapshot. | 03-05-2015 |
20150066855 | OUTCAST INDEX IN A DISTRIBUTED FILE SYSTEM - An outcast index in a distributed file system is described. A first server can receive an indication that a first replica stored on the first server is to be modified in view of a second replica stored on a second server. The first replica and the second replica are replicas of a same file. The first server updates metadata associated with the first replica to indicate an outcast state of the first replica. The first server receives an indication that the modification of the first replica is complete. The first server updates the metadata associated with the first replica to remove the outcast state of the first replica. | 03-05-2015 |
20150058841 | PROVIDING ENTROPY TO A GUEST OPERATING SYSTEM - The subject matter of this specification can be implemented in, among other things, a method including receiving, by a hypervisor of a host computer system, an entropy request from a guest operating system running on the host computer system. The method further includes identifying, by the hypervisor, an entropy source. The method further includes determining, by the hypervisor, an expected entropy usage at the host computer system. The method further includes providing, in response to the request, entropy from the entropy source to the guest operating system in view of the expected entropy usage. | 02-26-2015 |
20150058822 | SYSTEM AND METHOD FOR ESTIMATING IMPACT OF SOFTWARE UPDATES - A system and method of estimating impact of software updates includes obtaining usage measures for an instance of a software application, analyzing the software update of the software application by comparing base code for the software application to updated code for the software application, identifying one or more lines of interest from the base code based on the comparing, and aggregating the usage measures for the instance associated with the lines of interest to determine an impact factor. The base code corresponds to source code for the instance. The updated code corresponds to source code for the software application after the software update is applied to the base code. In some examples, the system and method further include normalizing the impact factor based on a length of time used to collect the usage measures, a number of lines of code in the base code, and a number of lines of code in the updated code. | 02-26-2015 |
20150058508 | Dynamic Shifting of Service Bus Components - Systems and methods are disclosed for processing messages using a dynamic messaging bus. An example system includes a plurality of services residing in a dynamic messaging bus including a plurality of sub-buses. Each service is assigned to a sub-bus of the plurality of sub-buses. The example system also includes a performance monitoring module that monitors a performance of one or more services executing on a sub-bus to which the respective one or more services is assigned. A first service is assigned to a first sub-bus and a second service is assigned to a second sub-bus. The example system further includes a swapping module that determines, based on the monitored performances of the first and second services, whether to swap the assignments of the first and second services such that the first service is assigned to the second sub-bus and the second service is assigned to the first sub-bus. | 02-26-2015 |
20150058471 | Measuring Resource Consumption in a Multi-Tenant Platform-as-a-Service (PaaS) System - Implementations for measuring resource consumption in a multi-tenant Platform-as-a-Service (PaaS) system are disclosed. A method of the disclosure includes determining, by a processing device, that a resource of an application of a multi-tenant Platform-as-a-Service (PaaS) system is initializing, the resource marked for usage tracking, accessing a list of initialization operations used in the initialization of the resource, determining that each of the initialization operations prior to a create usage record operation in the mapping are performed successfully, and creating a usage record for the resource using the create usage record operation. | 02-26-2015 |
20150058461 | IMAGE MANAGEMENT IN CLOUD ENVIRONMENTS - A system and method for managing images in a cloud including providing a uniform image management interface for receiving from a user uniform image descriptions for building images in a cloud, and receiving a uniform image description for building an image from the user. The uniform image description is provided to an application to create a cloud-specific image description to provide to an image builder for building the image, and the uniform image description is stored in a local data store. | 02-26-2015 |
20150058460 | GRANULAR PERMISSION ASSIGNMENT - A system and method for storing role definitions for cloud provider systems, receiving a first request to assign a user to a first role specifying a first cloud computing resource of a respective resource type, identifying a role definition corresponding to the first role that includes an action set permitted, and creating the first role for the user on the first cloud computing resource by associating the identified role definition with the first cloud computing resource and the user. A second request to assign the user to a second role is received specifying a second cloud computing of the respective resource type, and the second role is created for the user on the second cloud computing resource, where the identified role definition corresponds to the first and second roles, and wherein creating the second role includes associating the identified role definition with the first cloud computing resource and the user. | 02-26-2015 |
20150052585 | Systems and Methods for Managing Digital Content Entitlements - Systems and methods for managing digital content entitlements in distributed computer systems. An example method may comprise: receiving, by a processor, a request comprising an identity certificate and a digital content identifier; validating an entitlement of a requestor identified by the identity certificate to consume, over an entitlement period of time, the digital content identified by the digital content identifier; determining that a pre-defined authorization period of time does not exceed the entitlement period of time; and transmitting, to the requestor, a response comprising at least one of: a status code and a content certificate authorizing to consume the digital content for the pre-defined authorization period of time. | 02-19-2015 |
20150052496 | PROVIDING A USER INTERFACE LIBRARY FOR BUILDING WEB-BASED APPLICATIONS - A method and system for providing an interactive developer guide for guiding a user through a web-based application component selection process for a web-based application. The component selection process includes providing a component list including a plurality of configurable web-based application components, prompting the user to select a web-based application component from the list, and receiving a selection of a web-based application component from the list. The selected web-based application component is provided along with a snippet of code for integrating the selected web-based application component into the web-based application. | 02-19-2015 |
20150052216 | MANAGING DIGITAL CONTENT CONSUMPTION DATA - Systems and methods for managing data reflecting digital content consumption by computer systems. An example method may comprise: receiving a plurality of digital content consumption data objects, each digital content consumption data object comprising a timestamp and an identifier of a digital content item being consumed by the computer system at the moment of time defined by the timestamp; storing the plurality of digital content consumption data objects in a memory; receiving a request for digital content consumption information for a specified period of time; and retrieving from the memory two or more digital content consumption data objects having timestamps within the specified period of time. | 02-19-2015 |
20150052205 | SYSTEM AND METHOD FOR FLEXIBLE HOLDING STORAGE DURING MESSAGING - A system and method of flexible holding storage during messaging includes determining one or more properties of a message, the message to be stored in a holding storage area of a messaging system, determining status of one or more candidate holding storage devices, determining one or more storage selection rules, adjusting the one or more storage selection rules based on information associated with the status of the one or more candidate holding storage devices, and selecting a holding storage device for the message from the candidate holding storage devices based on the adjusted storage selection rules and information associated with the properties of the message. The one or more storage selection rules express preferences among the one or more candidate holding storage devices. In some examples, the system and method further include sending the message to the selected holding storage device. | 02-19-2015 |
20150052021 | SYSTEM AND METHOD FOR PROCESSING SERVICE QUERIES - A system and method of processing service queries includes receiving a first request for services from a client, the first request for services includes a service query including identifiers for an action, one or more candidate services, a services template, and an aggregation; parsing the services query to identify the action, the candidate services, the services template, and the aggregation; determining one or more combinations of candidate services based on types of the candidate services; applying the services template to each of the combinations of candidate services to determine results for each of the combinations of candidate services; aggregating the results based on the aggregation; selecting a preferred combination of candidate services based on the applied aggregation; and forwarding the results corresponding to the preferred combination to the action. | 02-19-2015 |
20150047058 | CERTIFICATE CHECKIN SERVICE - A method and system for a content provider to enable the consumption of content by properly entitled consumers (e.g., end-users, clients, customers) within a cloud provider network. A first certificate checkin service (CCS) executed by a processing device deployed in the cloud provider network receives a first set of usage data relating to content of a content provider consumed by a client of the cloud provider network. The first CCS provides the usage data to a communicatively coupled parent CCS. The first CCS provides the parent CCS with a request for entitlement data relating to the cloud provider, and stores the entitlement data received from the parent CCS. The entitlement data may be used by the first CCS to determine if the client is entitled to consume the content. | 02-12-2015 |
20150046513 | SYSTEM AND METHOD FOR ASSEMBLY AND USE OF INTEGRATION APPLICATIONS - A system and method of assembly and use of integration applications includes receiving a first request for services from a first client, the first request for services includes a first custom services header including one or more service descriptors, parsing the first custom services header to extract each of the service descriptors, determining a service corresponding to each of the service descriptors, inserting a request for the service into an integration application, deploying the integration application to an application server, adding a first entry to an application list, the first entry corresponding to the integration application, forwarding the first request for services to the integration application, receiving a response from the integration application, and returning the response to the first client. In some examples, the system and method further includes periodically purging one or more other integration applications from the application server based on timestamps recorded in the application list. | 02-12-2015 |
20150046463 | SYSTEM AND METHOD FOR CONTENT STORAGE - A system and method of content storage includes a content store for storing a plurality of first content blocks and one or more first indexes, a content manager including one or more first content analyzers, and an interface for receiving access requests for the plurality of first content blocks. Each of the one or more first indexes includes a plurality of first entries for organizing a plurality of second content blocks from the plurality of first content blocks according to a respective organizational structure. Each of the first entries includes a link to a corresponding content block from the plurality of second content blocks. Each of the plurality of content analyzers monitors the plurality of first content blocks for changes and updates a second index from the one or more first indexes based on information associated with the monitored changes. | 02-12-2015 |
20150043835 | MERGING AND SPLITTING DATA BLOCKS - A first set of discrete cosine transform (DCT) blocks is obtained. Each DCT block from the first set of DCT blocks has a first block size. When performing a split operation on the first set of DCT blocks, a filter is applied to the first set of DCT blocks. A second set of data blocks is generated based on the first set of DC blocks using a transform function. Each block in the second set of data blocks has a second block size. When performing a merge operation, the filter is applied to the second set of data blocks. | 02-12-2015 |
20150040216 | Systems and Methods for Restricting Application Binary Interfaces - Systems and methods for restricting application binary interfaces. An example method may comprise: initializing, by a process spawned by a kernel of an operating system running on a computer system, a system call filter inhibiting at least one type of application binary interface (ABI) calls; receiving a system call issued by a user space program executed by the computer system; intercepting the system call by the system call filter; determining that the system call is disabled by the system call filter; and performing a pre-determined action with respect to the system call. | 02-05-2015 |
20150039379 | SEGMENTED BUSINESS PROCESS ENGINE - A method and system for providing a segmented business process engine for generating a result in response to an event message. A process instance identification component of the segmented business process engine identifies a process instance associated with the event message and provides the process instance message to a selected process execution component of the segmented business process engine. The selected process execution component identifies a process definition in view of the process instance message and obtains state information associated with the event from a consistent image store component of the segmented business process engine. The selected process execution component generates a result associated with the event in view of the state information and the process definition and provides the result to at least one of the client application or another process instance identification component. | 02-05-2015 |
20150033215 | SYSTEM AND METHOD FOR DYNAMIC CLASS MANAGEMENT - A system and method of dynamic class management includes starting a skeleton application by loading a main class of the skeleton application and executing the main class, detecting a request for a requested class made by a referencing class, loading a class file associated with the requested class from a local storage device when the class file is stored on the local storage device and the requested class is not loaded in memory of the virtual machine, loading the class file from a class storage unit when the class file is not stored on the local storage device and the requested class is not loaded in the memory of the virtual machine, updating an application class graph (ACG) to record a dependency of the referencing class on the requested class, and updating an object table when the request is associated with creation of an object of the requested class. | 01-29-2015 |
20150032789 | DYNAMIC OBJECT ORIENTED REMOTE INSTANTIATION - An example system for distributing a workload of an application includes a class identifier that identifies a remotely instantiable class in an instruction. Execution of the instruction includes processing a workload. The example system also includes a distributor that selects a remote node to process a portion of the workload, sends a message to the selected remote node to cause (i) the selected remote node to instantiate the remotely instantiable class and (ii) the selected remote node to process the portion of the workload by invoking a method of the instantiated class, and receives a result of the processed portion of the workload. | 01-29-2015 |
20150026270 | DISTRIBUTION LIST CREATION AND SUBSCRIPTION - A method and system for the efficient creation and management of an e-mail distribution list. The method includes receiving, from a first sender, a first e-mail message directed to an e-mail address comprising a list name. An e-mail distribution list is created comprising a distribution list name, wherein the distribution list name is the list name of the e-mail address. The first sender is added as a first subscriber to the distribution list. A second e-mail communication directed to the e-mail address is received and the second sender is added as a second subscriber to the e-mail distribution list in view of the second e-mail communication. | 01-22-2015 |
20150009831 | WILD CARD FLOWS FOR SWITCHES AND VIRTUAL SWITCHES BASED ON HINTS FROM HYPERVISORS - A network switch receives routing information pertaining to a virtual machine from a hypervisor managing the virtual machine. The switch adds a wild card entry associated with the virtual machine to a first routing data structure, wherein the wild card entry specifies one or more exact match fields, one or more wild card fields and an action to perform for packets having properties that match the one or more exact match fields. | 01-08-2015 |
20140351802 | SYSTEM AND METHOD FOR RUN TIME DEPENDENCY RESOLUTION - A system and method of run time dependency resolution includes loading one or more dependency descriptors from an archive, determining that a class is to be loaded at run-time, selecting a first dependency descriptor from the one or more dependency descriptors based on information associated with the class, requesting the class from a dependency repository based on information associated with the class and information associated with the first dependency descriptor, receiving the class from the dependency repository, and loading the class. In some examples, the system and method further include determining a package for the dependency repository, loading the package, extracting a class file from the package, splitting the class file into one or more fragments, tagging each of the one or more fragments with information associated with the class file and the package, and transmitting each of the one or more tagged fragments to the dependency repository. | 11-27-2014 |
20140351799 | BINARY INTERFACE INSTRUMENTATION - A system and methods for generating metadata based on source code are disclosed. In accordance with one embodiment, a computer system receives a command to compile source code, and in response to the command, generates an executable and a metadata file based on the source code, where the metadata file comprises information pertaining to at least one of a scalar type of the source code, a variable of the source code, or a function of the source code. | 11-27-2014 |
20140351789 | SYSTEM AND METHOD FOR MANAGING IMMUTABLE OBJECTS - A system and method of managing immutable objects includes monitoring new object construction, detecting construction of an object, determining a key for the object, looking the key up in a persistent storage system, when the key is found in the persistent storage system, loading the object from the persistent storage system, and when the key is not found in the persistent storage system constructing the object, determining whether the object is immutable, and storing the object in the persistent storage system when the object is immutable. In some examples, determining whether the object is immutable includes examining each primitive type data member of the object, examining each reference type constructor parameter of the object to determine whether the reference type constructor parameter is defensively copied, examining all function calls used by the object to determine whether the function calls preserve immutability, and recursively examining each reference type data member of the object. | 11-27-2014 |
20140351650 | SYSTEM AND METHOD FOR CLUSTER DEBUGGING - A system and method of cluster debugging includes detecting debug events occurring in one or more first virtual machines, storing debug records, each of the debug records including information associated with a respective debug event selected from the debug events and a timestamp associated with the respective debug event, merging the debug records based on information associated with each timestamp, starting one or more second virtual machines, each of the one or more second virtual machines emulating a selected one of the one or more first virtual machines, synchronizing the one or more second virtual machines, retrieving the merged debug records, and playing the merged debug records back in chronological order on the one or more second virtual machines. In some examples, the method further includes collecting clock synchronization records. In some examples, merging the debug records includes altering an order of one or more of the debug records based on the clock synchronization records. | 11-27-2014 |
20140351371 | OVERLAY NETWORK OVER A MESSAGING NETWORK - A system and method for sending a message over a network are provided. An example system includes a first network interface that is assigned a first Internet Protocol (IP) address, where the network interface is linked to a logical network. The system also includes a messaging protocol module that obtains a first message to be sent over a messaging network to a target system linked to the logical network, generates a second message by encapsulating, based on a messaging protocol, the first message, and determines a destination address for the second message, where the destination address includes a text string and a second IP address of the target system. The system further includes a second network interface that sends over the messaging network the second message having the destination address, where the messaging network is based on the messaging protocol. | 11-27-2014 |
20140344832 | AUTOMATED FRAMEWORK FOR TRACKING AND MAINTAINING KERNEL SYMBOL LIST TYPES - Systems and methods are provided for tracking and maintaining kernel symbol list types. An example system includes a request tracker that receives from a consumer an identifier of a first kernel and at least one of a first set of kernel symbols of a first list type and a second set of kernel symbols of a second list type, where each kernel symbol of the first list type is included in a kernel application binary interface of the associated kernels. The system further includes a comparison module that compares kernel symbols included in the first kernel to kernel symbols included in the second kernel. The system also includes a notification module that sends, based on the comparison, a notification to the consumer, where the notification indicates a change in a kernel symbol included in the first kernel or second kernel. | 11-20-2014 |
20140337303 | BANDWIDTH OPTIMIZED TWO-PHASE COMMIT PROTOCOL FOR DISTRIBUTED TRANSACTIONS - A processing device executing a transaction manager sends prepare messages to a plurality of participants of a two-phase commit distributed transaction. Responsive to receiving commit responses from each of the plurality of participants, the processing device commits the two-phase commit distributed transaction. The processing device then ends the two-phase commit distributed transaction without first sending commit messages to the plurality of participants. | 11-13-2014 |
20140330974 | POLICY BASED APPLICATION ELASTICITY ACROSS HETEROGENEOUS COMPUTING INFRASTRUCTURE - A system and method for provisioning resources in a cloud environment are provided. An example system includes a communication module that receives from a requestor running in a cloud environment a request for one or more cloud resources. The example system also includes an identification module that identifies a set of provision policies for the requestor. The example system further includes a resource manager that determines, based on the set of provision policies, whether to approve the request for one or more cloud resources, and that when the request is determined to be approved, determines, based on the set of provision policies, whether to provision one or more physical computing machines and one or more virtual machines for the requestor. The one or more cloud resources is at least one of one or more physical computing machines and one or more virtual machines. | 11-06-2014 |
20140281732 | AUTOMATED UPDATE TESTING AND DEPLOYMENT - Systems and methods for testing and deploying an update are provided. A first server can execute a current version of an application in a production environment. A client communication from a client to the first server can be identified. The client communication can be transmitted to a second server in the production environment. The second server can be executing an updated version of the application. A first response to the client communication from the first server and a second response to the client communication from the second server can be received. The first response from the first server can be compared with the second response from the second server to determine whether the updated version of the application is compatible with the production environment. | 09-18-2014 |
20140280927 | Metering Software Infrastructure In A Cloud Computing Environment - A system and method include determining, by a processing device, a first duration of usage of a hardware resource on which a virtual machine is instantiated in a cloud, determining, by the processing device from the virtual machine on the cloud, a second duration of usage of a software resource that is utilized by a user on the virtual machine, the software resource comprising at least part of an operating system, and calculating, by the processing device, a usage of the cloud by the user in view of the first duration and the second duration. | 09-18-2014 |
20140280871 | CORRELATION OF ACTIVITIES ACROSS A DISTRIBUTED SYSTEM - A method and system for tracking activities relating to a common transaction executed across multiple services of a distributed computing environment. An aggregator receives intra-service activity information from collectors associated with a first service and a second service of the distributed computing environment. The aggregator identifies a first inter-service communication correlation linking the intra-service activity information of the first service to a first inter-service message. The aggregator further identifies a second inter-service communication correlation linking the intra-service activity information of the second service to the second inter-service message. The aggregator identifies an inter-service communication correlation linking the first inter-service message with the second inter-service message and associates the intra-service activity of the first service with the intra-service activity of the second service using the inter-service communication correlation. | 09-18-2014 |
20140280628 | HANDLING UNAVAILABLE DESTINATIONS IN A MESSAGING NETWORK - The subject matter of this specification can be implemented in, among other things, a method that includes establishing first federation links between a message broker system and neighbors of the message broker system. The method further includes distributing information describing the first federation links to other message broker systems. The method further includes receiving information describing second federation links between each of the other message broker systems and neighbors of each of the other message broker system. The method further includes identifying shortest paths between the message broker system and each of the other message broker systems. The method further includes receiving a request to send a message from a source message broker system to a destination message broker system. The method further includes determining that none of the shortest paths to the destination message broker system are available and, in response, taking corrective action. | 09-18-2014 |
20140280627 | FORWARDING MULTICAST MESSAGES IN A MESSAGING NETWORK - The subject matter of this specification can be implemented in, among other things, a method that includes establishing federation links between a message broker system and neighbors of the message broker system. The method includes identifying shortest paths between the message broker system and other message broker systems. The method includes receiving a request to forward a message from a source message broker system to destination message broker systems. The method includes identifying source paths between the source message broker system and the message broker system, intermediate message broker systems along the source paths, and destination paths between the message broker system and remaining ones of the destination message broker systems that neighbor the message broker system other than ones of the intermediate message broker systems. The method includes delivering the multicast message to the remaining ones of the destination message broker systems. | 09-18-2014 |
20140280438 | METHOD AND SYSTEM FOR OPTIMAL FAIR DISTRIBUTION AMONG BUCKETS OF DIFFERENT CAPACITIES - A processing device can implement an optimal fair distribution. In one embodiment, the processing device divides a distribution pattern associated with a distributed system into segments based on a quality of distribution for the distributed system. For each partition of the plurality of partitions, the processing device calculates a weight for the partition based on a number of segments in the plurality of segments and a capacity of a bucket associated with the partition. The processing device generates a map of partitions based on the weight for each of the plurality of partitions. The processing device distributes a plurality of objects in the distributed system to the plurality of buckets based on the map of partitions. | 09-18-2014 |
20140280437 | METHOD AND SYSTEM FOR COORDINATION OF INTER-OPERABLE INFRASTRUCTURE AS A SERVICE (IAAS) AND PLATFORM AS A SERVICE (PAAS) - A system and a method are disclosed for coordinating an inter-operable Platform as a Service (PaaS) layer and an Infrastructure as a Service (IaaS) layer. In one example, the method includes receiving, by a processing device associated with a PaaS layer, a message indicating a resource status associated with a plurality of resources of an IaaS layer, determining, by the processing device, a resource among the plurality of resources in the IaaS layer to instantiate a platform service of the PaaS layer, the determining is based on the message indicating the resource status associated with the plurality of resources of the IaaS layer; and transmitting, by the processing device, a message directing the IaaS layer to instantiate the platform service on the determined resource in the IaaS layer. | 09-18-2014 |
20140280019 | SYSTEMS AND METHODS FOR MANAGING DATA IN RELATIONAL DATABASE MANAGEMENT SYSTEM - A mechanism for managing data in relational database management systems (RDBMS). The method includes receiving a structured query language (SQL) query to be executed on a relational database management system (RDBMS). The RDBMS includes a schema of tables divided into a plurality of partitions and the SQL query includes an operation of data to be executed on the RDBMS. The method also includes determining whether the SQL query is a valid SQL | 09-18-2014 |
20140278341 | TRANSLATION ASSESSMENT - A system and method for assessing translation quality are disclosed. In one example, a computer system receives data associated with a translation from a first text in a first natural language to a second text in a second natural language, wherein the data comprises a first value that is based on one or more semantic errors of the second text, a second value that is based on extraneous content in the second text, and a third value that is based on missing content in the second text; and determining by the computer system, based on the first value, the second value, and the third value, a score that quantifies translation quality of the second text with respect to the first text. | 09-18-2014 |
20140258990 | METHOD AND SYSTEM FOR PROVIDING A CORE DUMP-LEVEL STACK TRACE - A system and a method are disclosed for providing a core dump-level stack trace. In one example, the method includes receiving, by a processing device, a recorded state of a program, the recorded state including a base address of the program and a stack frame including an executable address for a call instruction of a function of the program; determining, by the processing device, a list of functions in view of the recorded state of the program, and creating, by the processing device, a stack trace in view of the list of functions without using debugging symbols. | 09-11-2014 |
20140258422 | PROVIDING SOCIAL NETWORK USER DISCUSSIONS - Discussion of content between users of social networks is described. A request from a first user to discuss content with a recipient user in a first social network is received, wherein the recipient user has a first identifier in the first social network. A request from a second user to discuss content with the recipient user in a second social network is received, wherein the recipient user has a second identifier in the second social network. A discussion is initiated between the second user and the recipient user about the content in the second social network. The recipient user is tracked in view of the first identifier in the first social network and the second identifier in the second social network. | 09-11-2014 |
20140258320 | INTEGRATING REMOVABLE STORAGE DEVICES - Integrating removable storage devices is disclosed. A described method includes retrieving an identifier of a removable storage device connected to a computer system and matching the identifier with a device identification stored in a file of the computer system. The file includes an application identifier corresponding to the device identification. The method also includes executing an application corresponding to the application identifier associated with the device identification matched to the identifier. | 09-11-2014 |
20140250297 | CERTIFICATE RENEWAL - Certificate renewal is described. A processing device searches a certificate authority (CA) database of digital certificates to identify a certificate that satisfies an expiration condition for automatic renewal. The processing device renews the certificate as a renewed certificate without any user interaction. The processing device is to renew the certificate in view of the expiration condition. The expiration condition includes an expiration of the certificate. When renewing of the certificate, the processing device reuses a key of the certificate for the renewed certificate and sets a new expiration date for the renewed certificate. | 09-04-2014 |
20140245392 | Systems, Methods, and Computer Program Products for Authenticating Human Users of a Computer System - A computer program product having a computer readable medium tangibly recording computer program logic for use in a secure computer system with a first human user and a second human user being authorized users of the secure computer system, the computer program product including code to receive input from the first human user to select the second human user for authentication, code to electronically generate a secure code in response to the input from the first human user, code to display the secure code to the first human user, code to allow the second human user access to the secure computer system after the second human user has been verified by the secure computer system, and code to display the secure code to the second human user as the second human user accesses the secure computer system. | 08-28-2014 |
20140245372 | HTTP PASSWORD MEDIATOR - A method and system for password mediation including identifying an HTTP request issued by a client application executing on a client device, the HTTP request indicating an operation to be performed for a user of the client application at a destination system, obtaining user credentials using the HTTP request, requesting security information for the user with respect to the destination system, determining whether the user is allowed to perform the operation based on the security information, and upon determining that the user is allowed to perform the operation, modifying the HTTP request based on the security information and sending the modified HTTP request to the destination system. | 08-28-2014 |
20140245322 | MESSAGING BUS RESIDING ON A MOBILE DEVICE - Systems and methods are disclosed for handling messages using a messaging bus residing on a mobile device. An example system includes a register module that registers first and second applications. The second application is executing on the mobile device. The system also includes a routing module that receives from the first application a communication in a first format for the second application, determines a second format associated with the second application, and determines whether the first format is different from the second format. When the first format is determined to be different from the second format, the routing module transmits to the second application the communication in the second format. The system further includes a translation module that when the first format is determined to be different from the second format, translates the communication in the first format to the second format. | 08-28-2014 |
20140245275 | BYTECODE MODIFICATION - Systems and methods for modifying bytecode at runtime are provided. A virtual machine can execute bytecode of an application. The virtual machine can receive a modification for the application that includes modified bytecode for the application. The virtual machine can identify a portion of the bytecode of the application that corresponds to the modified bytecode. The virtual machine can update the portion of the bytecode of the application at runtime using the modification. | 08-28-2014 |
20140245270 | SYSTEMS AND METHODS FOR PROVIDING CONTEXT SIMULATION - A mechanism for providing context simulation. A method includes receiving context relay from a client machine. The context relay includes context input set (CIS) and configuration difference (diff) data. The method also includes applying the diff data to an application so that configuration settings of the application are same as the configuration settings of a first application on the client machine. The method also includes retrieving message information from the CIS and sending the message information to the application. The method further includes executing the application in same interval as the first application being executed on the client machine. | 08-28-2014 |
20140245065 | Tracking Subclasses of and Operations Performed by Generic Objects in a Computer System - A mechanism for tracking subclasses of and operations performed by generic objects in a computer system is disclosed. A method of the disclosure includes receiving, by a debugging tool executed from a processing device, an invocation from a code annotation in a function executed by the processing device, the invocation to initialize an object subclass tracking module of the debugging tool, requesting a stack trace of a call stack of the function, generating an identification (ID) using the requested stack trace, and storing the generated ID and the stack trace in a new entry in an object tracking table. | 08-28-2014 |
20140244877 | Emulating Level Triggered Interrupts of Physical Devices Assigned to a Virtual Machine - Systems and methods are disclosed for handling a level triggered interrupt generated by a device assigned to a virtual machine running on a host machine. An example system includes a host machine that hosts a virtual machine and a device coupled to the host machine. The device is assigned to the virtual machine and generates one or more interrupts. The example system also includes an interrupt handler that receives an interrupt generated by the device, masks the interrupt, injects the interrupt into the virtual machine, receives an indication that the virtual machine has attempted to access the device, and in response to the indication that the virtual machine has attempted to access the device, unmasks the interrupt from the device. | 08-28-2014 |
20140244746 | Systems and Methods for Message Routing Using Link State Information - Systems and methods for link state-based message routing in messaging systems. An example method, performed by a message broker, may comprise: receiving a topology update message from a second message broker; updating, in view of the topology update message, a data structure storing messaging bus topology information; receiving a message including an identifier of a destination message broker; determining, using the data structure storing messaging bus topology information, an identifier of a peer message broker corresponding to the destination message broker; and forwarding the message to the peer message broker over a messaging bus. | 08-28-2014 |
20140244716 | Shared Application Store for a Platform-as-a-Service (PaaS) System - A shared application store for a platform-as-a-service (PaaS) system is disclosed. A method of the disclosure includes receiving, by a processing device of an application store, an indication of a selection of an application provided by the application store, the application configured for deployment on a platform-as-a-service (PaaS) system, issuing a command to create a copy of a repository associated with the selected application, wherein the command to create the copy further comprises tracking changes made to the copy and flowing the tracked changes to the repository from which the copy originates, and sending a copy of the repository in response to the command to create the copy, wherein the copy of the repository is deployed on the PaaS system for a user that selected the application. | 08-28-2014 |
20140244666 | SYSTEMS AND METHODS FOR PREVENTING OVERLOAD OF AN APPLICATION - A mechanism for preventing overload of application is disclosed. A method includes receiving a query submitted by a user, the query includes user identification (ID) and an operation to be processed by an application. The method also includes filtering user records to identify subset of the user records associated with the user ID and determining quality of service (QoS) ranking from the subset of the user records associated with the user ID. The method also includes submitting the query to the application when the determined QoS ranking is assigned with high ranking. The method also includes filtering query records to identify subset of the query records associated with the query when the determined QoS ranking is assigned with low ranking. The method further includes determining quality string (QS) rating associated with the subset of query records and providing a decision on the query in view of the determined QS rating. | 08-28-2014 |
20140237458 | Systems and Methods for Efficient Just-In-Time Compilation - Systems and methods for just-in-time (JIT) code compilation by a computer system. An example method may comprise identifying a defined pattern in a byte stream, evaluating a conditional expression associated with the pattern, and compiling the byte stream into a native code, while excluding, in view of the evaluating, a portion of byte stream associated with the pattern. | 08-21-2014 |
20140237197 | NON-UNIFORM MEMORY ACCESS (NUMA) RESOURCE ASSIGNMENT AND RE-EVALUATION - A system and a method are disclosed for providing for non-uniform memory access (NUMA) resource assignment and re-evaluation. In one example, the method includes receiving, by a processing device, a request to launch a first process in a system having a plurality of Non-Uniform Memory Access (NUMA) nodes, determining, by the processing device, a resource requirement of the first process, determining, based on resources available on the plurality of NUMA nodes, a preferred NUMA node of the plurality of NUMA nodes to execute the first process, the preferred NUMA node being determined by the processing device without user input, and binding, by the processing device, the first process to the preferred NUMA node. | 08-21-2014 |
20140237087 | SERVICE POOL FOR MULTI-TENANT APPLICATIONS - A processing device receives a request from a client for a specific service. Responsive to determining that the specific service is not running, the processing device converts a previously instantiated generic service into the specific service. To perform the conversion, the processing device assigns the generic service from a service pool for the specific service and renames the generic service based on a name of the specific service. The processing device additionally queries a directory service for specific service logic associated with the specific service. The processing device receives at least one of the specific service logic or a reference to the specific service logic from the directory service, and updates the generic service to include at least one of the specific service logic or the reference to the specific service logic. | 08-21-2014 |
20140237069 | ASSIGNING PRE-EXISTING PROCESSES TO SELECT SETS OF NON-UNIFORM MEMORY ACCESS (NUMA) ALIGNED RESOURCES - A system and a method are disclosed for assigning pre-existing processes to select sets of non-uniform memory access (NUMA) aligned resources. In one example, the method includes receiving, by a processing device, a report indicating a measure of resources available on each respective Non-Uniform Memory Access (NUMA) node of a plurality of NUMA nodes in a system, and a measure of resources consumed by a first process being executed on a first NUMA node of the plurality of NUMA nodes in the system, determining that the first process being executed requires an additional resource, determining whether the first NUMA node has capacity for the additional resource, when the first NUMA node does not have the capacity for the additional resource, identifying a second NUMA node for the first process in view of the report, and binding, by the processing device, the first process to the second NUMA node. | 08-21-2014 |
20140237009 | SERVICING DATABASE OPERATIONS USING A MESSAGING SERVER - A client computing system publishes a database operation request to a global exchange on an advanced message queuing protocol (AMQP) server, wherein the database operation request identifies an operation to be performed on a database using a different application layer protocol. The client computing system obtains database operation result data from a client queue, on the AMQP server, that corresponds to the client computing system in response to publishing the database operation request and converts the database operation result data from a wire level format to a data format for the different application layer protocol. | 08-21-2014 |
20140236895 | FILE LINK MIGRATION FOR DECOMMISIONING A STORAGE SERVER - A first server hosted on a computer system identifies a set of file links in the first server that is associated with one or more hard links that point to file data for a file in the first server. The computer system migrates the set of files links for the file to a second server prior to migrating the file data for the file in the first server to the second server. The second server is hosted by a second computer system. The first computer system migrates the file data for the file in the first server to the second server when the migration of the set of file links for the file to the second server is complete. | 08-21-2014 |
20140236568 | INPUT METHOD TO SUPPORT MULTIPLE LANGUAGES - A method and system for displaying words with a script corresponding to the language of the words, where an input word is received and the system determines whether the word is in a first language list. If the word is in the first language list, the word is displayed in a first script. If the word is not in the first language list, the word is converted to a different script corresponding to a different language, and displayed in the different script. | 08-21-2014 |
20140222878 | TRACKING FILES AND DIRECTORIES RELATED TO UNSUCCESSFUL CHANGE OPERATIONS - A server computer system identifies change operations for an object in a file system. The object can be a file or a directory. The change operations can include a change to a local copy of the object and one or more remote copies of the object. The server computer system determines that one of the change operations is unsuccessful and creates tracking data that identifies the object that is associated with at least one change operation that is unsuccessful. | 08-07-2014 |
20140215498 | SYSTEMS AND METHODS FOR PROVIDING OPERATION SYSTEM HISTORY - A mechanism for providing an operating system history is disclosed. A method includes placing, by an operating system (OS) of a processing device, a pointer to context of a first application in a history context of plurality of applications in a direct interface array (DIR) of the OS upon indication of switching from an interface of a first application to the interface of a second application. The method also includes moving the pointer from the context of the first application to the context of the second application in the DIR in view of an indication of a closing of the interface of the second application. The second application is closed in a foreground of the OS and is executing in a background of the OS. The method further includes providing the interface of the second application in the foreground of the OS upon activation of a global back function. | 07-31-2014 |
20140215492 | DYNAMIC PROVISIONING OF MESSAGE GROUPS - The subject matter of this specification can be implemented in, among other things, a method that includes receiving, by a processing device, one or more first requests to add multiple messages on a message queue. The first requests specify a message group for the messages. The method further includes determining, by the processing device, that the message group does not exist on the message queue in response to receiving the first requests. The method further includes automatically creating, by the processing device, the message group on the message queue in response to determining that the message group does not exist on the message queue. The method further includes adding, by the processing device, the messages to the message group on the message queue. | 07-31-2014 |
20140215479 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR SCHEDULING PROCESSING JOBS TO RUN IN A COMPUTER SYSTEM - A method includes, in a program that includes a defined number of job slots for data updating processing jobs, scheduling a first job in one of the slots, and executing the first job, wherein the first job includes scanning a list of additional jobs and scheduling those additional jobs for execution, further wherein a total number of the additional jobs in the program exceeds the defined number of job slots. | 07-31-2014 |
20140215452 | Deployment Optimization for High Availability in a Multi-Tenant Platform-as-a-Service (PaaS) System - A mechanism for deployment optimization in a multi-tenant Platform-as-a-Service (PaaS) system is disclosed. A method of the disclosure includes receiving, at a source code management (SCM) repository maintained by a node executing on a computing device, updated application code of an application executed on the node, wherein the node is provided by a multi-tenant Platform-as-a-Service (PaaS) system, providing, by the node, the updated application code to one or more cartridge instances that implement framework of the application, determining, by each of the one or more cartridge instances, that a marker file is present in the updated application code, the marker file indicating that hot deployment functionality is to be implemented for the application, and implementing, by each of the one or more cartridge instances using hot deployment functionality that is specific to the cartridge instance, code changes in the updated application code without a restart of the application. | 07-31-2014 |
20140215312 | Responsive Layout Based on Behavioral Intent in a Multi-Tenant Platform-as-a-Service (PaaS) System - A responsive layout based on behavioral intent in a multi-tenant PaaS system is disclosed. A method of the disclosure includes determining a profile of a user of a PaaS system, an application context for each application associated with the user and hosted by the PaaS system, and a task context of an access to the PaaS system by the user, providing indicators of the determined profile, the determined application context, and the determined task context to a browser application of the user, and providing HyperText Markup Language (HTML) and Cascading Style Sheets (CSS) files of the management console to the browser application, wherein the provided indicators are applied to the HTML and CSS files to generate a responsive layout, wherein the indicators are associated with one or more variants of the HTML and CSS files that provide the responsive layout. | 07-31-2014 |
20140215202 | EXTENSION OF A PLATFORM CONFIGURATION REGISTER WITH A KNOWN VALUE - A computing system calculates a hash value of binary of a component of the computing system using a hash function and determines whether a signature that is associated with the binary of the component is valid. A trusted platform module in the computing system extends a platform configuration register value in the trusted platform module using a known value that is associated with the binary if the signature is valid. | 07-31-2014 |
20140215198 | METHOD AND SYSTEM TO PROVIDE A VARIABLE TICK RATE FOR THE KERNEL - A system and a method are disclosed for providing a variable tick rate for the kernel of an operating system. In one example, the method includes receiving, by a processing device, a desired tick rate for a kernel of an operating system, comparing the desired tick rate with a default tick rate, and updating a tick rate parameter of the kernel with the desired tick rate when the desired tick rate is different from the default tick rate. | 07-31-2014 |
20140215049 | METHOD AND SYSTEM FOR ROBUST CLOUD INSTANCE LAUNCHING - A method and system for receiving a request to deploy virtual machine instances on a first cloud and determining whether the deployment has been prepared for launch on cloud. Upon determining that the deployment has not been prepared for launch, aborting a launch of the deployment is initiated. Upon determining that the deployment has been prepared for launch, a launch of the deployment on the cloud is initiated. Upon determining that the launch of at least one of the virtual machine instances has failed to launch, a re-launch of the at least one instance that has failed to launch is initiated or a rollback of the deployment is initiated. | 07-31-2014 |
20140215000 | SYSTEM AND METHOD FOR DYNAMIC CACHING - A system and method of managing cache units includes providing, by a first cache unit, caching services to a first plurality of clients, collecting information associated with a usage of the first cache unit by the first plurality of clients, determining a similarity in cache usage between every pair of clients selected from the first plurality of clients based on information associated with the collected information, selecting a second plurality of clients from the first plurality of clients based on information associated with the determined similarity in cache usage, replicating the first cache unit to create a second and a third cache unit, providing, by the second cache unit, caching services to the second plurality of clients, and providing, by the third cache unit, caching services to one or more third clients selected from the first plurality of clients, each of the third clients not being in the second plurality of clients. | 07-31-2014 |
20140214805 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR SELECTING A MACHINE TO PROCESS A CLIENT REQUEST - A method includes consulting a database that includes a first entry indicating amounts of time that a first service provider machine takes to perform individual actions of the plurality of actions and a second entry indicating amounts of time that a second service provider machine takes to perform individual actions of the plurality of actions; generating a first estimate for the amount of time the first service provider machine is expected to take in processing the requested service, wherein generating the first estimate includes summing times associated with the plurality of actions from the first entry; and generating a second estimate for the amount of time the second service provider machine is expected to take in processing the requested service, wherein generating the second estimate includes summing times associated with the plurality of actions from the second entry. | 07-31-2014 |
20140208398 | Resource-Centric Authorization Schemes - A first request to change a permission of a first user for accessing a first resource is received via a service application programming interface (API) of an authorization server. In response to the first request, a first resource-based permission data structure associated with the first resource is accessed to identify an entry associated with the first user, wherein the first resource-based permission data structure has a plurality of entries corresponding to a plurality of users, respectively, each user being associated with one or more permissions for accessing the first resource. Further, one or more permissions in the identified entry associated with the first user are updated. | 07-24-2014 |
20140208153 | METHOD AND SYSTEM FOR PROVIDING HIGH AVAILABILITY TO COMPUTER APPLICATIONS - A system and method for assigning application specific IP addresses to individual applications. The system may be operable to assign a unique IP address to an application, and alias the application IP address to a NIC IP address on the host where the application is running. In an exemplary embodiment, the system may be further operable to migrate the application IP address to a new host as part of a migration, and alias the application IP address to a NIC in the new host as part of the migration. | 07-24-2014 |
20140201214 | CREATING A FILE DESCRIPTOR INDEPENDENT OF AN OPEN OPERATION - A server computer system receives a file access request for accessing a file in a file system. The file access request includes a file handle for the file. The server computer system assigns a value as a file descriptor for the file. The assignment is performed without issuing a file open request to open the file. The server computer system associates the file descriptor with the file handle in a data store accessible to a storage subsystem and provides the file descriptor for accessing the file to the storage subsystem according to the file access request. | 07-17-2014 |
20140201177 | ACCESSING A FILE SYSTEM USING A HARD LINK MAPPED TO A FILE HANDLE - A server computer system receives a request for access to an object in a file system. The object is a file or a directory. The server computer system identifies an object handle in the request. The object handle is an identifier of the object. The server computer system identifies an object link that is associated with the object handle. The object link is a hard link to the file or a relative symbolic link to the directory. The server computer system accesses the object using the object link that is associated with the object handle. | 07-17-2014 |
20140201124 | PROPERTY REACTIVE MODIFICATIONS IN A RETE NETWORK - A processing device executing a Rete rule engine modifies a particular property of an object that has traversed a Rete network. The processing device associates a first data structure with the object, the first data structure indicating that the particular property of the object has been modified. The processing device then determines whether the particular property is a constraint relevant to a node of the Rete network based on comparing the first data structure to a second data structure associated with the node, wherein the second data structure identifies one or more modifiable properties that are constraints relevant to the node. If the particular property is a constraint relevant to the node, the processing device evaluates the object with the node. If the particular property is not a constraint relevant to the node, the processing device determines not to evaluate the object with the node. | 07-17-2014 |
20140198911 | SHARING A SECRET VIA LINEAR INTERPOLATION - A method and system distributes shares of a secret among cooperating entities using linear interpolation. In one embodiment, a linear equation is formed using the secret and random elements. The linear equation represents a K-dimensional hyperplane, where K is the number of shares to reconstruct the secret. Shares of the secrets are created, with each share corresponding to a point on the secret hyperplane. The shares are then distributed to cooperating entities for secret sharing. | 07-17-2014 |
20140196028 | METHOD AND SYSTEM FOR SHARING TEMPLATES AND MULTI-INSTANCE CLOUD DEPLOYABLE APPLICATIONS - A server computer system identifies a set of image templates for building a cloud server image and a compatible deployable template for launching the cloud server image in a template repository. The server computer system associates the set of image templates with the compatible deployable template in the template repository. Upon receiving a user selection, the server computer system obtains the set of image templates and the compatible deployable temple. | 07-10-2014 |
20140181397 | SYNCHRONOUS MANAGEMENT OF DISK FLUSH REQUESTS - In a process for migrating a virtual machine's storage from a source disk to a destination disk, a virtual machine monitor (VMM) records a source-generation count representing contents on the source disk, a writes-mirrored value representing a number of writes replicated from the source disk to the destination disk at a time contents of the disks were equal, a flush-request value representing the source-generation count at a time a flush is requested by a guest operating system of the virtual machine, and a writes-flushed value representing the writes-mirrored value at a time of a last flush of the destination disk. Upon identification of a steady state, the VMM sets the writes-mirrored value to the recorded source-generation count. The VMM determines if a request to flush the source disk has been issued by the guest, sets the flush-request value to the source-generation count at a time of the flush request, and flushes the destination disk upon determining that the flush-request value is greater than the writes-flushed value and the flush-request value is less than or equal to the writes-mirrored value. | 06-26-2014 |
20140181015 | LIGHTWEIGHT SYNCHRONIZATION OF MIRRORED DISKS - In a process for migrating a virtual machine's storage from a source disk to a destination disk, during a steady state (i.e., wherein the contents of the virtual machine stored on the source disk and the destination disk are equal), a virtual machine monitor receives a set of write requests from a guest operating system (“guest”) of the virtual machine, provides confirmation of the completion of the set of writes to the source disk, and asynchronously replicates the set of write requests to the destination disk. Upon receipt of a flush request from the guest, the virtual machine monitor confirms completion of the flushing of the destination disk following replication of the write requests to the destination disk. Upon receipt of a switch request from a virtual machine manager, the virtual machine monitor switches the virtual machine to the destination disk and issues subsequent write requests to the destination disk. | 06-26-2014 |
20140173112 | METHOD AND SYSTEM FOR PLUGGABLE INFRASTRUCTURE FOR CLOUD PROVIDER SELECTION - A server computer system receives a request to launch a deployment and determines a set of matches from a pool of cloud providers that meets minimum requirements for the deployment. The server computer identifies a selection criteria comprising priority ranking criteria and probability ranking criteria for the deployment. The server computer then determines one of the cloud providers for the deployment from the set of matches based on the priority ranking criteria and the probability ranking criteria. | 06-19-2014 |
20140157262 | MULTI-TIER PLATFORM-AS-A-SERVICE (PAAS) DEPLOYMENT REDUCED TO SINGLE-TIER ARCHITECTURE FOR DEVELOPMENT - A multi-tier platform-as-a-service (PaaS) deployment reduced to a single-tier architecture for development is disclosed. A method of the disclosure includes mapping multiple tiers of a PaaS system to a consolidated environment executable on a virtual machine (VM), wherein networking stacks of the VM maintain a separation between the multiple tiers in the consolidated environment, and providing the consolidated environment as a development instance of the PaaS system for execution on the VM, the consolidated environment facilitating testing of code changes to the PaaS system. | 06-05-2014 |
20140156940 | Mechanism for Page Replacement in Cache Memory - A mechanism for page replacement for cache memory is disclosed. A method of the disclosure includes referencing an entry of a data structure of a cache in memory to identify a stored value of an eviction counter, the stored value of the eviction counter placed in the entry when a page of a file previously stored in the cache was evicted from the cache, determining a refault distance of the page of the file based on a difference between the stored value of the eviction counter and a current value of the eviction counter, and adjusting a ratio of cache lists maintained by the processing device to track pages in the cache, the adjusting based on the determined refault distance. | 06-05-2014 |
20140156337 | METHOD AND SYSTEM FOR SELF-ORGANIZING AD-HOC WORKFLOW - A system and a method are disclosed for self-organizing ad-hoc workflow. In one implementation, the present disclosure describes a self-learning system that monitors input conditions and monitors user steps in executing the ad-hoc workflow. When a new user executes the ad-hoc workflow process, the system receives a group of values for a set of input parameters, determines whether the received group of values has a matching group of values in a database, locates groups of values in the database with at least one matching value of the received group of values, determines a closest match between the received group of values and the located groups of values in the database using importance weights of input parameters in the set of input parameters, and selects the workflow associated with the closest match of the received group of values. | 06-05-2014 |
20140149858 | SYSTEMS AND METHODS FOR REFERENCING A PORTION OF A DOCUMENT - A mechanism for referencing a portion of a document. A method includes identifying, by a processing device of a user device, a portion of a document, the portion selected by a user of the user device. The method also includes displaying, by the processing device, the selected portion of the document as a graphical representation of an icon on the user device. The method also includes detecting, by the processing device, a reference to the icon displaying the selected portion of the document, the reference performed by the user. The method further includes providing, by the processing device, the referenced selected portion of the document associated with the icon to the user. | 05-29-2014 |
20140149781 | Method for Batch Execution of System Calls in an Operating System - A system and a method are disclosed for batch execution of system calls in an operating system. In one implementation, a processing device configures a system call batching buffer table in a user space of an operating system, the system call batching buffer table including a plurality of system call units, associates a system call number with the system call batching buffer table, and issues a trap instruction to a kernel of the operating system to execute at least one of the plurality of system call units, the trap instruction including the system call number. | 05-29-2014 |
20140149709 | METHOD AND SYSTEM FOR DYNAMICALLY UPDATING DATA FIELDS OF BUFFERS - A computing system can include memory management capabilities. In one embodiment, the system receives a request to update a first size of each of a plurality of portions of memory to a second size. The plurality of portions of memory can be associated with a first memory pool and the first memory pool can be associated with a memory pool instance. The system creates a memory pool subinstance based on the request. The memory pool subinstance can be associated with the memory pool instance. The system associates a second memory pool with the memory pool subinstance. The second memory pool comprises portions of memory of the second size and the second memory pool is associated with the memory pool instance. | 05-29-2014 |
20140149634 | DETECTION OF GUEST DISK CACHE - A virtual machine disk page detector running on a computing device detects guest disk cache usage. The detector detects a request from a virtual operating system to read an object into a virtual memory page from a virtual disk, maintains a record of a page identifier and a corresponding virtual disk address in a guest cache data structure, and modifies a protection identifier of the virtual memory page to indicate that the virtual memory page is protected. | 05-29-2014 |
20140149564 | SYSTEMS AND METHODS FOR PREVENTING OVERLOAD IN ENTERPRISE APPLICATION INTEGRATION SERVICES - A mechanism for preventing overload in enterprise application integration (EAI) services. A method includes determining, by a processing device executing enterprise application integration (EAI) system, a first location in a chain of services in the EAI. The method also includes providing, by the processing device, access for insertion of an overload prevention service beginning (OPSB) at the first location in the chain of services in the EAI. The OPSB includes a service in the chain of services and counts number of messages processed in the EAI service. The method also includes determining, by the processing device, a second location in the chain of services in the EAI. The second location occurs after the first location in the chain of services in the EAI. The method further providing, by the processing device, access for the insertion of an overload prevention service end (OPSE) at the second location in the chain of services in the EAI. The OPSB is in communication with the OPSE and the OPSE comprises a service in the chain of services and is in communication with the OPSB. | 05-29-2014 |
20140149482 | SYSTEMS AND METHODS FOR PROVIDING SPECIFICATION OF A LOCATION OF A USER OF A COMMUNICATION DEVICE - A mechanism for providing specification of a location of a user of a communication device. A method includes receiving, by a processing device a first position data of a communication device. The first position data is a location of the user of the communication device at a first time when the user begins to at least either compose a message on the communication device or initiate an application to compose the message. The method also includes receiving, by the processing device, a second position data of the communication device. The second position data is the location of the user at a second time when the user sends the message to a recipient via the communication device. The method also includes generating, by the processing device, a velocity vector based on the first position data, the second position data, the first time data and the second time data. The method further includes sending, by the processing device, the velocity vector with the message to the recipient. | 05-29-2014 |
20140149475 | MANAGING DISTRIBUTED STORAGE QUOTAS - A processing device causes a plurality of storage servers to create tenant identifiers for a tenant of a multi-tenant distributed file system that is distributed over the plurality of storage servers, the plurality of storage servers having underlying local file systems that interface with the multi-tenant distributed file system. The processing device maps the tenant to the tenant identifiers. The processing device assigns a global storage quota to the tenant. The processing device divides the global storage quota into a plurality of local storage quotas and assigns a local storage quota of the plurality of local storage quotas to each storage server of the plurality of storage servers. | 05-29-2014 |
20140149452 | SYSTEMS AND METHODS FOR PROVIDING MESSAGES FOR A JAVA MESSAGE SERVICE - A mechanism for providing messages for Java message service (JMS). A method includes receiving, by a Java message service (JMS) server executed by a processing device, key-value data pair. The key-value data pair is sent by a client. The method also includes extracting, by the processing device, destination information of a JMS message from the value data of the key-value data pair. The destination information is either a JMS queue or a JMS topic. The method further includes storing, by the processing device, the key-value data pair in a column family of not only structured query language (NoSQL) database when one of the JMS queue or the JMS topic associated with the received key-value data pair exists in the column family of the the NoSQL database. The column family includes a plurality of stored key-value data pairs. | 05-29-2014 |
20140149243 | VENDOR DOWNLOAD INTEGRATION - System for software vendor integration into an electronic marketplace. An example system receives, via an electronic software marketplace and from a user who is signed in to the electronic software marketplace, a request to download a software application hosted by a software vendor. The example system populates a form request for the software application with information from a user profile associated with the user, and submits the form request to the software vendor such that the user can download the software application directly from the software vendor. | 05-29-2014 |
20140148091 | SYSTEMS AND METHODS FOR DISTRIBUTING DATA BETWEEN MOBILE DEVICES - A mechanism for distributing data between mobile devices. A method includes creating, by a processing device, a group comprising of mobile devices in an ad-hoc mode that share data. The mobile devices are located within a pre-defined range. The method also includes identifying, by the processing device, at least a portion of the data available for sharing in at least one of the mobile devices. The method also includes replicating, by the processing device, the identified data for distribution to the mobile devices. The method further includes distributing, by the processing device, the replicated data to the at least one of the mobile devices in the immediate mode when the at least one of the mobile devices is within the pre-defined range. | 05-29-2014 |
20140143318 | PROVIDING AN INTERFACE TO MULTIPLE CLOUD COMPUTING SYSTEMS - Discussion of content between users of social networks is described. A cloud computing system of a plurality of cloud computing systems is determined for processing a request in a first syntax from a client computer system. The request is translated from the first syntax to a second syntax of the cloud computing system and transmitted to the cloud computing system in the second syntax. The server computer system includes drivers to enable bi-directional translation of communications between the client computer system and the plurality of cloud computing systems, wherein the drivers provide bi-directional translation for at least one of the plurality of cloud computing systems. | 05-22-2014 |
20140143220 | STRIPING FILES ACROSS NODES OF A DISTRIBUTED FILE SYSTEM - A processing device executing a client of a distributed file system receives an initial file, wherein the distributed file system comprises a plurality of nodes, each of the plurality of nodes comprising a local file system that interfaces with the distributed file system. The processing device causes the plurality of nodes to generate file entries of the initial file. The processing device divides the initial file into a plurality of portions, each of the plurality of portions having initial offsets within the initial file. The processing device assigns subsets of the plurality of portions to the plurality of nodes, wherein each of the plurality of nodes is assigned a different subset. The processing device causes the plurality of nodes to write the portions of the assigned subsets at modified offsets within the file entries, wherein the modified offsets cause the portions of the assigned subsets to be contiguous. | 05-22-2014 |
20140137224 | SECURING PASSWORDS WITH HASH VALUE - A password security system, hosted by a server, whose method of operation may include receiving a client hash value from a client where the client hash value is computed by hashing a password to generate a first hash value, and hashing the first hash value combined with a user input of an answer to a challenge to generate the client hash value. A server hash value is computed using password data for the user that is stored in a data store coupled to the server and a server-side answer that is stored in the data store. A determination is made whether the server hash value matches the client hash value and data access is granted to the user in view of a determination that the server hash value matches the client hash value, and data access is denied to the user in view of a determination that the server hash value does not match the client hash value. | 05-15-2014 |
20140136848 | DISTRIBUTING KEYPAIRS BETWEEN NETWORK APPLIANCES, SERVERS, AND OTHER NETWORK ASSETS - A method and apparatus for providing an automated key distribution to enable communication between two networked devices. A monitoring device receives a request from a network device to send a certificate using a second secure connection prior to an expiration of a timeout period, wherein the second secure connection was created using a known port in response to determining that a request to create a first secure connection was rejected. The monitoring device sends the certificate to the network device using the second secure connection, and establishes the first secure connection with the network device in response to the network device receiving the public key of the monitoring device from a server system by using the certificate. | 05-15-2014 |
20140136180 | AUTOMATIC TRANSLATION OF SYSTEM MESSAGES - A processing device receives a message identifier associated with an application. and identifies a first language that an operating system running on the processing device is configured to use. Responsive to determining that a first application resource bundle associated with the application and configured for the first language is not available, the processing device selects a second application resource bundle that is associated with the application and configured for a second language, identifies a first version of a message associated with the message identifier in the second application resource bundle, sends the first version of the message to an automated translator with a request to translate the first version of the message to the first language, and receives a first translated version of the message that is in the first language. The processing device may then present or store the first translated version of the message. | 05-15-2014 |