Abstract: The described implementations relate to processing of electronic data. One implementation is manifest as a system that can include logic and at least one processing device configured to execute the logic. The logic can be configured to receive a first task request to execute a first task that uses a resource when performed. The first task can have an associated first level of interactivity. The logic can also be configured to receive a second task request to execute a second task that also uses the resource when performed. The second task can have an associated second level of interactivity. The logic can also be configured to selectively throttle the first task and the second task based upon the first level of interactivity and the second level of interactivity.
Type:
Grant
Filed:
January 8, 2013
Date of Patent:
September 1, 2015
Assignee:
Microsoft Technology Licensing, LLC
Inventors:
Siddhartha Mathur, David A. Sterling, Lu Yang, Zhengwen Zhu, David Nunez Tejerina, Ozan Ozhan, Michael Butler
Abstract: A power management and data center resource monitoring mechanism is provided for selecting new processing elements in a data center. When a condition is detected for selecting new processing elements, one or more processing elements are selected as the new processing elements based on at least a temperature parameter and a usage history parameter of at least some of the processing elements in the data center. Workload is consolidated onto the new processing elements to conserve energy.
Type:
Grant
Filed:
December 13, 2012
Date of Patent:
September 1, 2015
Assignee:
TELEFONAKTIEBOLAGET L M ERICSSON (PUBL)
Inventors:
Lawrence Haydock, Zhongwen Zhu, Nazin Hossain
Abstract: A device may receive information that identifies a first task to be processed, may determine a performance metric value indicative of a behavior of a processor while processing a second task, and may assign, based on the performance metric value, the first task to a bin for processing the first task, the bin including a set of processors that operate based on a power characteristic.
Abstract: Methods, systems and apparatuses for processor selection in multi-processor systems are disclosed. An example method includes, for each of a plurality of processors, retrieving a list of interrupt instances for a plurality of interrupt types; calculating an interrupt instance count value for each of the plurality of interrupt types; multiplying a corresponding weighting factor by the interrupt instance count value for each one of the plurality of interrupt types to generate a plurality of weighted interrupt values; calculating an overall weighted vector value based on the sum of the plurality of weighted interrupt values; and designating one of the plurality of processors as a selected processor based on the lowest overall weighted vector value.
Abstract: A system and method of managing a cluster of distributed machines is described. A cluster manager receives status updates regarding tasks running on each machine in the cluster from a task tracker running on the machine. The cluster manager receives resource requests from a job tracker created by a client wishing to run a job in the cluster. The cluster manager is responsible for implementing push-based fair scheduling of resources to the job trackers. The job tracker is responsible for running tasks for one job in the resource identified by the cluster manager. In one embodiment, the job tracker can run in the client for small jobs and in the cluster for larger jobs. The cluster manager can also be restarted, for example, for software updates without restraining the cluster.
Abstract: A method, apparatus, and computer readable article of manufacture for executing a transaction by a processor apparatus that includes a plurality of hardware threads. The method includes the steps of: executing, by the processor apparatus using the plurality of hardware threads, a main software thread for executing the transaction and a helper software thread for executing a barrier function; and deciding, by the processor apparatus, whether or not the barrier function is required to be executed when the main software thread encounters a transactional load or store operation that requires the main software thread to read or write data.
Type:
Grant
Filed:
March 15, 2013
Date of Patent:
August 4, 2015
Assignee:
International Business Machines Corporation
Abstract: A determination is made as to whether a creator of a created executable file is a trusted installer, e.g., a digitally signed installer. Upon a determination that the creator is a trusted installer, the created executable file is defined as a trusted file. By bestowing the trust of a trusted installer to the executable files that the installer creates, suspicious behavior by the created executable files and associated processes, which otherwise would be blocked, is allowed. In this manner, false positives, e.g., blocking of legitimate behavior by the created executable file and associated process(es), are avoided.
Abstract: Embodiments allow management software applications to distinguish computational assets without the use of static, predetermined identifiers that are susceptible to duplication along with computational assets. Managers and computational assets are associated with authenticator values. Additionally, a manager and computational asset determine (e.g., negotiate) an expected nonce (number used once) to be provided by either party when requesting a transaction. Upon receiving a transaction request associated with an authenticator value and a transaction nonce, the sender's knowledge of the expected nonce is proven when the nonce associated with the request matches the expected nonce, and disproven otherwise. When such knowledge is proven, the manager treats the computational asset as the one originally associated with the computational asset authenticator value and negotiates a new nonce.
Abstract: The present invention relates to a virtual machine system that includes a plurality of processors and executes a plurality of virtual machines in parallel with use of the plurality of processors. An aim thereof is to suppress power consumption without sacrificing the performance of the virtual machine system. When there are at least two processors that do not have any virtual machines allocated thereto, one of the at least two processors is supplied with power so as to be placed in a standby state, and a remaining one or more of the at least two processors are not supplied with power.
Type:
Grant
Filed:
June 27, 2011
Date of Patent:
June 30, 2015
Assignee:
PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
Abstract: In one embodiment, the present invention includes a processor with multiple cores each having a self-test circuit to determine a frequency profile and a leakage power profile of the corresponding core. In turn, a scheduler is coupled to receive the frequency profiles and the leakage power profiles and to schedule an application on at least some of the cores based on the frequency profiles and the leakage power profiles. Other embodiments are described and claimed.
Type:
Grant
Filed:
December 20, 2010
Date of Patent:
June 23, 2015
Assignee:
Intel Corporation
Inventors:
Saurabh Dighe, Sriram R. Vangal, Nitin Y. Borkar, Vivek K. De
Abstract: As a result of the systems and methods described herein, an alternative MapReduce implementation is provided which monitors for impending termination notices, and allows dynamic checkpointing and storing of processed portions of a map task, such that any processing which is interrupted by large scale terminations of a plurality of computing devices—such as those resulting from spot market rate fluctuations—is preserved.
Abstract: A method of scheduling a plurality of tasks for a plurality of memories in a memory system is disclosed. The method includes classifying each task among the plurality of tasks to a task type among a plurality of task types, disposing a plurality of task queues according to the plurality of task types wherein each task queue stores tasks to be executed within the plurality of tasks, assigning a priority for each task type among the plurality of task types, disposing at least one execution queue; and converting a first task stored in a first task queue among the plurality of task queues into at least one command to be stored in a first execution queue among the at least one execution queue, wherein the at least one command is executed according to the priority of a first task type corresponding to the first task queue.
Abstract: A computer-implemented method for migrating replicated virtual machine disks may include 1) replicating a virtual machine disk from an initial data store at a primary site to an initial data store at a secondary site to create a replicated virtual machine disk, 2) identifying a request to migrate the virtual machine disk within the primary site, 3) pausing replication of the virtual machine disk and mirroring the virtual machine disk from the initial data store a subsequent data store at the primary site, mirroring the replicated virtual machine disk from the initial data store to a subsequent data store at the secondary site, and 4) upon mirroring, resuming replication of the virtual machine disk by replicating the virtual machine disk from the subsequent data store at the primary site to the subsequent data store at the secondary site. Various other methods, systems, and computer-readable media are also disclosed.
Abstract: A virtual machine migration method conducted in a virtual machine migration system that includes a virtual machine of a migration source computer and a migrating target computer. The migration source computer conducts processing to send host physical address information of an MMIO region corresponding to a device used by the virtual machine through directed I/O to a migration target computer, and to cause a connection target of the device to be switched to the migration target computer by a switching device that connects the device to the computers. The migration target computer conducts processing to allocate an MMIO region corresponding to the host physical address information sent by the migration source computer, to the device connected to the computers by the switching device.
Abstract: The specification and drawings present a new method and software related product (e.g., computer readable medium, a computer, a computer memory or a laser recording disk) presented for: using a generic application programming interface (GAPI) for reading information, e.g., multi-application files (i.e., files created by two or more applications) stored in devices, e.g., computers, computer network devices/workstations, communication network devices, servers, memories (e.g., archives, backup repositories), etc.
Abstract: An event logging interface on a computer system is used to record an event when an application hosted by the computer system encounters the event. The event logging interface receives data pertaining to an event from the application. Using the event logging interface, the computer system determines a logical target of the event, and determines one or more physical destinations referenced by the logical target. The data is then dispatched to one of the physical destinations.
Type:
Grant
Filed:
November 12, 2009
Date of Patent:
March 31, 2015
Assignee:
Red Hat, Inc.
Inventors:
Dmitri V. Pal, Stephen J. Gallagher, John R. Dennis
Abstract: A dummy layer generating/finishing section 1301 generates a dummy layer, in the case where a screen layer of a secure virtual machine 101 is generated. In the case where at least one dummy layer is generated, a display driver switching section 1322 switches the display control to the secure virtual machine 101 for causing a screen data combining section 1331 to combine screen layers. On the other hand, in the case where a dummy layer is not generated, the display driver switching section 1322 switches the display control to a non-secure virtual machine 102 for causing a screen data combining section 1321 to combine screen layers.
Type:
Grant
Filed:
October 19, 2011
Date of Patent:
March 17, 2015
Assignee:
Panasonic Intellectual Property Corporation of America
Abstract: Improved techniques for interaction between a host device (e.g., host computer) and a portable media device (e.g., media player) are disclosed. According to one embodiment, interaction between the host device and the portable media device can be performed over a network. The network can include wired and/or wireless components. The network can also be local, regional or global in geographic coverage. The interaction over the network can be initiated by the portable media device, manually or automatically, so as to request a content update from the host device. In response to the requested content update, updated content is received at the portable media device from the host device, provided a network connection between the portable media device and the host device is available through the network.
Abstract: A system for providing performance statistics of applications in real time includes a first application that obtains current performance data of at least one second application in real time, utilizes the current performance data to determine a list of functions and the number of events occurred during the execution of each function, presents the resulting data to a user, and periodically refreshes the presented data using up-to-date performance data of the second application.
Type:
Grant
Filed:
December 11, 2009
Date of Patent:
February 10, 2015
Assignee:
Red Hat, Inc.
Inventors:
Arnaldo Carvalho de Melo, Ingo Molnar, Thomas Gleixner
Abstract: Methods and apparatus enforce computing policies of an enterprise in a distributed manner so that idiosyncratic services to a computing device can be minimized or altogether eliminated. Pluralities of virtual machines are arranged on one or more computing devices and define, for example, applications specified by a user and shared services approved by the enterprise. A central library stores the virtual machines and each is available for check-out by users. A manager evaluates the virtual machines for satisfactory compliance with the computing policies at a time when the virtual machines are resident in the library. Upon confirmation of satisfactory compliance, the applications and shared services are available for deployment to users. Otherwise, the virtual machines are centrally serviced for compliance and/or tested before redeployment. Libraries, managers, software program products, threat assessment, and policy management are other features, to name a few.