Patent application number | Description | Published |
20090112783 | METHOD AND SYSTEM OF ASSOCIATING A RUNTIME EVENT WITH A COMPONENT - A method and a system of associating a runtime event with a component. The method includes catching the runtime event; catching the context of the current running environment and determining the current component based on said context; and getting the associating policy of current component and determining the responsible component associated with said runtime event based on said associating policy. | 04-30-2009 |
20090217022 | METHOD AND APPARATUS FOR LOADING CLASSES AND RE-ORGANIZING CLASS ARCHIVES - A method and apparatus for loading classes to virtual machines and a method and apparatus for reorganizing class archives. The method for loading a class to a virtual machine includes organizing a class archive before class loading such that the organized class archive includes a class contraction portion and loading only the class contraction portion of the class archive to the virtual machine at the moment of class loading. By first loading the class contraction portion from the organized class archive to the virtual machine at the moment of loading, the present invention curtails code redundancy, shortens loading time and reduces occupied memory resources. | 08-27-2009 |
20090328007 | MEMORY LEAK DIAGNOSIS - A method and an apparatus for diagnosing memory leak. The method includes: tracing the allocation of objects; recording allocation paths and allocation time of each object; giving to each object one unique identifier (ID) corresponding to an allocation path; determining the allocation path to which each object belongs; organizing the objects which are allocated but still not collected, and counting the age generations of the objects of the similar type according to the allocation time of each object; ranking the allocation paths according to the age generations of the surviving objects; and analyzing the ranking of the allocation paths, in which the allocation path with higher rank is more probable to introduce memory leaks. Thus, the suspicious allocation path possibly incurring memory leaks is selected and reported to the user for analysis. | 12-31-2009 |
20100049570 | METHOD AND SYSTEM FOR DETERMINING RESOURCE USAGE OF EACH TENANT IN A MULTI-TENANT ARCHITECTURE - A computer implemented method and system for determining resource usage of a tenant in a multi-tenant architecture. The method includes the steps of: recording, within predetermined time intervals, total consumption of each resource in each predetermined time interval; obtaining total times of calling each operation by each tenant in each predetermined time interval; calculating consumption of each resource during each operation based on the total times and the total consumption obtained within the period of time; and calculating usage of each resource by each tenant within the period of time based on the calculated consumption of each resource during each operation and the total times of calling each operation of each tenant in each predetermined time interval. The system includes apparatus for performing the above method. | 02-25-2010 |
20110191630 | DIAGNOSING A FAULT INCIDENT IN A DATA CENTER - A method, computer program product and apparatus for diagnosing a fault incident in a data center. A determination is made as to whether a fault incident happened in the data center. If a fault incident happened, then the business logic being executed in a node where the fault incident happened is determined. The log files associated with the execution process of the business logic is selected based on a management model corresponding to the data center, where the management model reflects the deployment and application dependency of the business logics. The fault incident is diagnosed based on the log files. The management model is utilized to select the log files associated with the execution process of the business logic, and to write information of the business logic and dependency relationships between the applications into the log file, so as to automatically, rapidly and accurately diagnose the fault incident. | 08-04-2011 |
20110271353 | PERFORMING AUTHORIZATION CONTROL IN A CLOUD STORAGE SYSTEM - A method, apparatus and computer program product for performing authorization control in a cloud storage system. The method comprises: receiving an access request to a file block, wherein the file block is embedded with tag data comprising at least file block authorization information; retrieving the file block; extracting the file block authorization information from the tag data; determining whether the access request matches the file block authorization information; and performing the access request if the access request matches the file block authorization information. Effective authorization control may be performed in a cloud storage system. | 11-03-2011 |
20120158786 | PERFORMING AUTHORIZATION CONTROL IN A CLOUD STORAGE SYSTEM - A method, apparatus and computer program product for performing authorization control in a cloud storage system. The method comprises: receiving an access request to a file block, wherein the file block is embedded with tag data comprising at least file block authorization information; retrieving the file block; extracting the file block authorization information from the tag data; determining whether the access request matches the file block authorization information; and performing the access request if the access request matches the file block authorization information. Effective authorization control may be performed in a cloud storage system. | 06-21-2012 |
20140025828 | EXTENDING PROCESSING CAPACITY OF SERVER - Embodiments of the present invention relate to a method and apparatus for extending processing capacity of a server side. In one embodiment, there is provided a method of extending processing capacity of the server side, comprising: deciding a job to be offloaded from the server side; partitioning the job into one or more tasks; allocating the one or more tasks to one or more clients in response to http requests transmitted from the one or more clients; receiving, from the http requests transmitted from the one or more clients, responses of the one or more clients to the from the server side one or more tasks. | 01-23-2014 |