Patent application number | Description | Published |
20080282253 | METHOD OF MANAGING RESOURCES WITHIN A SET OF PROCESSES - A workload management system where processes associated with a class have resource management strategies that are specific to that class is provided. The system includes more than one class, with at least one unique algorithm for executing a workload associated with each class. Each algorithm may comprise a strategy for executing a workload that is specific to that class and the algorithms of one class may be completely unrelated to the algorithms of another class. The workload management system allows workloads with different attributes to use system resources in ways that best benefit a workload, while maximizing usage of the system's resources and with minimized degradation to other workloads running concurrently. | 11-13-2008 |
20090049430 | Verifying that binary object file has been generated from source files - For a source file on which basis a binary object file has been generated, a digital signature is generated for the source file, and the digital signature is stored. The digital signature may be secure hash algorithm (SHA) hash values. The binary object file is output. To verify that the binary object file has been generated from the source file, a digital signature is generated for the source file, and compared to the digital signature for the source file as previously stored. Where the digital signature for the source file as has been generated matches the digital signature for the source file previously stored, the binary object file is indicated as having been generated from the source file. | 02-19-2009 |
20090070558 | MULTIPLEXING PER-PROBEPOINT INSTRUCTION SLOTS FOR OUT-OF-LINE EXECUTION - The present invention provides a probe system and method for multithreaded user-space programs. The system includes an instrumentation module that enables single stepping out of line processing for multithreaded programs, an establish probepoint module that divides up an area of the probed program's memory into a plurality of instruction slots, an ensure slot assigned module that ensures that an instruction slot is assigned to a probepoint, a slot acquisition module that acquires the instruction slot for the probepoint, stealing a slot from another probepoint as needed, and a free slot module that relinquishes the instruction slot owned by the probepoint when the probepoint is being unregistered. | 03-12-2009 |
20090070867 | METHOD FOR SECURELY ENABLING DYNAMIC INSTRUMENTATION - A method is provided for securely enabling dynamic instrumentation. The method includes categorizing probes, upon creation, into one or more classes, providing lists of permissions for activating the probes and associating users with the permissions for activating the probes, such that certain users have permissions for activating certain probes. Users are associated with permissions by mapping classes of probes to permissions and mapping users to permissions, mapping classes of users to probes, or mapping users to at least one of classes of probes and classes of capabilities. | 03-12-2009 |
20090119576 | MANAGING SOURCE ANNOTATION METADATA - A method, system and computer program product for managing source annotation metadata. The metadata management technique may include maintaining a set of metadata, maintaining data/metadata relationships between individual units of the metadata and individual units of the source data, and maintaining metadata/metadata relationships between individual units of the metadata. The metadata/metadata relationships define two or more intersecting search pathways through the metadata that intersect at one or more metadata units belonging to more than one search domain. | 05-07-2009 |
20090249291 | Method To Transfer Annotation Across Versions of the Data - A method, apparatus, and article are provided for managing migration of annotations between versions of source code. Annotations associated with patterns of source code are identified. A comparison of the modified source code is conducted in conjunction with the identified annotations in a prior version of the source code to determine if the annotations may be migrated to any portions of the modified source code. The comparison includes an exact match and a partial match. With respect to the partial match, a threshold value is employed to define the parameters of a partial match. All annotations that are determine to be an exact match or a partial match are automatically migrated to a location in the modified source code determine to match within the threshold value. | 10-01-2009 |
20090254883 | METADATA-INTEGRATED DEBUGGER - A method, system and computer program product for software debugging using annotation metadata. A set of metadata comprising source code annotation information for a software program is maintained, together with data/metadata relationships between individual units of the metadata and individual units of the source code. A software debugging point is set that is associated with debugging point metadata comprising one or more units the metadata. A debugging action is performed when execution of the software program reaches said debugging point. | 10-08-2009 |
20090307670 | OPTIMIZATION OF SYSTEM PERFORMANCE THROUGH SCENARIO EVALUATION - A system, method and computer program product for optimizing a software system through scenario evaluation. In accordance with the disclosed technique, a request is received for evaluation of an operational scenario that operates over an environment that is a superset of existing system capabilities encompassing system features or parameters that are not available in the currently running system. A knowledge base is consulted to derive recommendations with respect to operating parameters that may be collected to evaluate the scenario, mechanisms for gathering data relating to the parameters, and data evaluator operations for deriving a data evaluation result based on the data gathering. The knowledge base is further consulted to determine a reconfiguration recommendation based on the result. Scenario evaluation is performed based on simulation of the reconfiguration recommendation using the data evaluation result to determine efficacy of the scenario. | 12-10-2009 |
20100037073 | Apparatus and Method for Selective Power Reduction of Memory Hardware - Apparatus and Method for Selective Power Reduction of Memory Hardware A method and apparatus are provided for managing delivery of power to one or more hardware memory devices in a computer system. The computer system is configured with a processor and at least two hardware memory devices. An energy exchange threshold for the computer system is set, and management of one or more of the hardware memory devices is employed when the computer system exceeds an energy exchange threshold. | 02-11-2010 |
20100037094 | Application Failure Recovery - A method, apparatus, and article of manufacture to dynamically address and resolve an improper shut-down of an application. Internal state data of the application is stored in persistent memory. New internal state data is dynamically created and authenticated following an improper shut-down of the application. Responsive to the authentication, the application is re-started with the authenticated new internal state data, without being subject to an immediate improper shut-down. | 02-11-2010 |
20100185652 | Multi-Dimensional Resource Fallback - A method, system, and article of manufacture are provided for locating a resource in a data structure hierarchy. Data is stored in a hierarchy, such as an objected oriented hierarchy. For each encountered resource that requires data from the hierarchy, identifier and level information is extracted for that resource. A set of resource fallback rules are followed to traverse the hierarchy and to locate a corresponding data item for the subject resource in the hierarchy. | 07-22-2010 |
20120216057 | Selective Power Reduction of Memory Hardware - Managing delivery of power to one or more hardware memory devices in a computer system. The computer system is configured with a processor and at least two hardware memory devices. A temperature monitor tool is employed to monitor the hardware memory devices. Management of an addressable subset of the hardware memory devices is employed in response to the monitored temperature reading. | 08-23-2012 |