Abstract: A method is provided for tracking a transaction communicated in a network through nodes connected using sockets, wherein socket data is stored in one or more memory devices. The method includes identifying a start node and a trace-out socket on that node, and for i from 1 to N: by using the socket data, identifying an ith traced node and a trace-in socket on that node, wherein the ith base node is the start node if i=1 or the (i?1)th traced node if i>1, and wherein the trace-in socket on the ith traced node and the trace-out socket on the ith base node form a socket pair; and by using the socket data, identifying a trace-out socket on the ith traced node.
Abstract: A first-system has a plurality of interconnected computers which receive operational data from remote data sources. The first-system has a software application for processing the operational data received from remote data sources and the operational data characterizes performance of one or more software applications running on the remote data sources. A load capacity āLā for the first-system is determined; wherein L is the number of remote data sources that can be processed before the system becomes overloaded. The first-system is repeatedly monitors remote data sources to determine their number. When the number of remote data sources exceeds a predetermined fraction of L the first-system is replicated and replications are installed. When a client requests data from one of the systems, using a time stamp the data is automatically provided. The first-system is replicated as more processing power is required conditional upon the load capacity of the system.
Abstract: A first-system has a plurality of interconnected computers which receive operational data from remote data sources. The first-system has a software application for processing the operational data received from remote data sources and the operational data characterizes performance of one or more software applications running on the remote data sources. A load capacity āLā for the first-system is determined; wherein L is the number of remote data sources that can be processed before the system becomes overloaded. The first-system is repeatedly monitors remote data sources to determine their number. When the number of remote data sources exceeds a predetermined fraction of L the first-system is replicated and replications are installed. When a client requests data from one of the systems, using a time stamp the data is automatically provided. The first-system is replicated as more processing power is required conditional upon the load capacity of the system.
Abstract: A system and method for providing detailed information about how a software application is running has a processor and memory including a shared memory. The method provides an automated way of extracting information from a first software application having a plurality of libraries as the application executes. A special library used to interrogate an execution application is placed in the execution path but does not use I/O resources while it is extracting information about an executing software application. An intercept causes the special library to execute, and information is seamless provided to an output device during execution of the interrogated application.
Abstract: A system and method for providing detailed information about how a software application is running has a processor and memory including a shared memory. The method provides an automated way of extracting information from a first software application having a plurality of libraries as the application executes. A special library used to interrogate an execution application is placed in the execution path but does not use I/O resources while it is extracting information about an executing software application. An intercept causes the special library to execute, and information is seamless provided to an output device during execution of the interrogated application.