Monitoring (epo) Patents (Class 714/E11.179)
  • Publication number: 20120030523
    Abstract: Methods and systems are described that improve the alarming logic for Border Gateway Protocol (BGP) flapping events. Embodiments provide an alarm threshold on BGP flapping conditions and alert on BGP related events. A reduction in silent failures and network outage minutes is achieved.
    Type: Application
    Filed: July 28, 2010
    Publication date: February 2, 2012
    Inventors: Wen-Jui Li, Sanjini George, Stephen J. Griesmer
  • Publication number: 20120023376
    Abstract: Systems and methods are disclosed herein, including those that operate to monitor a first set of operational parameters associated with a memory vault, to adjust a second set of operational parameters associated with the memory vault, and to perform alerting and reporting operations to a host device.
    Type: Application
    Filed: September 30, 2011
    Publication date: January 26, 2012
    Inventor: Joe M. Jeddeloh
  • Publication number: 20120023375
    Abstract: A method for generating performance alerts in a database system. The method includes collecting a predefined set of performance data, and comparing the performance data to one or more predefined thresholds. The method also includes determining if any of the performance data exceeds the one or more predefined thresholds, and generating an alert if any of the data exceeds one of the predefined thresholds.
    Type: Application
    Filed: July 23, 2010
    Publication date: January 26, 2012
    Applicant: SALESFORCE.COM, INC.
    Inventors: Arup Dutta, Jesse Collins
  • Publication number: 20120023361
    Abstract: Disclosed is a method for recovering from the failure of a gateway server. In some embodiment, the method includes: receiving, at a backup gateway server, a message transmitted from a client, the message comprising a network resource previously allocated to the client by the gateway server that failed; determining whether the network resource is free; and transmitting, from the backup gateway server to the client, an acknowledgment indicating that the client may continue using the network resource in response to a determination that the network resource is free.
    Type: Application
    Filed: January 16, 2009
    Publication date: January 26, 2012
    Applicant: Telefonaktiebolaget L M Erricsson (Publ)
    Inventors: Tarik Hammam, Anders Franzen, Mattias Holmqvist
  • Publication number: 20120017120
    Abstract: Techniques are described herein that are capable of monitoring activity with respect to a distributed application. A server system includes logical tiers, each including processing system(s) configured to process messages in accordance with a respective protocol (e.g., an ASP.net® protocol, WCF protocol, SQL protocol, etc.). When a user initiates an activity with respect to a distributed application, hops are performed between the logical tiers and/or between components of the distributed application to complete the requested activity. A hop is a transfer of a message or a procedure call from one processing system to another processing system. A common identifier may be assigned to each of the hops that are performed with regard to the activity. If a failure occurs with respect to the activity, the common identifier may be used to gather information regarding the hops. For instance, the information may be used to determine a source of the failure.
    Type: Application
    Filed: July 19, 2010
    Publication date: January 19, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Venkata Seshu Kumar Kurapati, Ilarie G. Letca, Ashvinkumar J. Sanghvi, Dhananjay Madhusudan Mahajan, Alexandre A. Coelho, Rajeev Sudhakar, Anandha Ganesan
  • Publication number: 20120017131
    Abstract: A built-in self test (BiST) system is described. The BiST system includes a circuit-under-test. The BiST system also includes one or more embedded sensors. Each of the embedded sensors includes one or more switches connected to one or more nodes within the circuit-under-test. The BiST system further includes a signal generator. The BiST system also includes a bus interface. The bus interface provides for external access of the BiST system.
    Type: Application
    Filed: July 14, 2010
    Publication date: January 19, 2012
    Applicant: QUALCOMM INCORPORATED
    Inventors: Gaurab Banerjee, Manas Behera, Kenneth Charles Barnett
  • Publication number: 20120005543
    Abstract: In a method and a device for securely checking the exclusivity of a binary active/passive state of redundant units, the device includes: at least one exclusive communication device of the state capable of transmitting an exclusive signal relating to the exclusivity of the state to at least one checking device integrated within each of the units. The checking device is capable of checking and confirming the exclusivity of the state. Each of said redundant units in the active state is capable of transmitting to the exclusive communication device the identity signal; the exclusive communication device is capable of receiving at least one of the identity signals from the redundant units; the exclusive communication signal is capable of producing the exclusive signal from at least one of the identity signals; and the checking device is capable of determining the exclusivity of the state of the unit by reading the exclusive signal.
    Type: Application
    Filed: March 31, 2009
    Publication date: January 5, 2012
    Applicant: SIEMENS S.A.S.
    Inventor: Eric Chenu
  • Publication number: 20120005541
    Abstract: Item values associated with an execution state of a program executed on a computer are collected in detail while suppressing the computer load. When reducing the interval for collecting values of one item to be monitored, the interval for collecting values of items other than that item is increased. If the computer load is increased, an interval of at least one item is increased. Moreover, there is provided an upper limit for the number of items whose intervals can be reduced simultaneously. Moreover, when varying the interval of the item according to the values of the respective items, the interval variation range is varied according to the item state and the computer load.
    Type: Application
    Filed: September 15, 2011
    Publication date: January 5, 2012
    Inventors: Hidetaka SASAKI, Motoaki Hirabayashi
  • Publication number: 20120005523
    Abstract: There is provided an intra-realm AAA (authentication, authorization and accounting) fallback mechanism, wherein the single global realm may be divided in one or more sub-realms. The thus presented mechanism exemplarily comprises detecting a failure of an authentication server serving at least one authentication client within a first sub-realm of a single-realm authentication system, and routing authentication messages of the at least one authentication client to a fallback authentication server within a second sub-realm of the single-realm authentication system, wherein routing may exemplarily comprise sub-realm based source routing.
    Type: Application
    Filed: April 21, 2009
    Publication date: January 5, 2012
    Applicant: NOKIA SIEMENS NETWORKS OY
    Inventors: Jouni Korhonen, Hannes Tschofenig
  • Publication number: 20110320883
    Abstract: A processor that is configured to perform parallel operations in a computer system where one or more memory hazards may be present is described. An instruction fetch unit within the processor is configured to fetch instructions for detecting one or more critical memory hazards between memory addresses if memory operations are performed in parallel on multiple addresses corresponding to at least a partial vector of addresses. Note that critical memory hazards include memory hazards that lead to different results when the memory addresses are processed in parallel than when the memory addresses are processed sequentially. Furthermore, an execution unit within the processor is configured to execute the instructions for detecting the one or more critical memory hazards.
    Type: Application
    Filed: September 1, 2011
    Publication date: December 29, 2011
    Applicant: APPLE INC.
    Inventors: Jeffry E. Gonion, Keith E. Diefendorff
  • Publication number: 20110320882
    Abstract: Troubleshooting virtual environment deployment based on two level file system signatures, in one aspect, may include creating a first level file system signature including a set of file names of files in an image of a virtual machine taken at a point in time and associated status of the files as compared with an image of the virtual machine taken at a preceding point in time. A second level file system signature may be created using file content differences of the files having modified status in the set of file names. The first level file system signature may be compared with a first level file system signature pattern associated with one or more previous deployment of the same software and related to the same point in time. Optionally, the second level file system signature may be compared with a second level file system signature pattern.
    Type: Application
    Filed: June 29, 2010
    Publication date: December 29, 2011
    Applicant: International Business Machines Corporation
    Inventors: Kirk A. Beaty, Michael R. Head, Anca Sailer, Charles O. Schulz, Hidayatullah H. Shaikh
  • Publication number: 20110314345
    Abstract: A virtual machine is migrated from a source physical machine to a target physical machine, where the virtual machine has an executable service and a monitoring agent for monitoring the executable service. In response to the migrating, a monitoring manager is started that issues a command to start the executable service. It is determined whether the command is for the executable service that is already running in the migrated virtual machine. In response to such determining, the started monitoring manager is associated with the already running executable service, where the monitoring manager cooperates with the monitoring agent to detect fault of the executable service.
    Type: Application
    Filed: June 18, 2010
    Publication date: December 22, 2011
    Inventors: Richard Mark Stern, James R. Curtis
  • Publication number: 20110307743
    Abstract: A method for reducing false alarms in a monitoring system comprising the steps of: providing an initial fault set (or a preliminary fault set) and using a decision process to successively reduce this initial fault set to a fault ensemble, said decision process using increasing probability or confidence in the initial fault set to generate the fault ensemble, which is considered to reflect a true abnormal condition; the decision process comprising at least two steps: the first step is generating a preliminary fault set by using a standard anomaly detection method with the additional variable (or adaptive) thresholds or temporal filters; the second step is using the preliminary fault set to generate at least one fault ensemble, each of which comprises a reduced number of refined faults that represent a more confident explanation of the cause(s) of an abnormal condition.
    Type: Application
    Filed: June 11, 2010
    Publication date: December 15, 2011
    Inventors: Asif Khalak, Link C. Jaw
  • Publication number: 20110296251
    Abstract: A method of generating a heartbeat signal for an application comprising one or more objects that may enter a halt state is described. The method comprises: sending a status request to a defined interface on each object; and monitoring responses to the status requests to ascertain if each object is operating normally or in a halt state. The method further comprises: generating an application valid signal in the event that each object is operating normally; transmitting the application valid signal, if generated, to a monitoring component independent of the application; and generating at the monitoring component a heartbeat valid signal in response to receipt of the application valid signal.
    Type: Application
    Filed: May 26, 2010
    Publication date: December 1, 2011
    Applicant: NCR CORPORAITON
    Inventors: Ian M. Joy, Gordon D. Patton
  • Publication number: 20110289356
    Abstract: In accordance with embodiments disclosed herein, there are provided systems, devices, and methods for testing methods in a multi-tenant database environment, including, for example, hosting a plurality of customer codebases within a host organization, where each of the plurality of customer codebases includes a plurality of operational statements and one or more test methods. Such a method further includes generating a first test result set by executing the one or more test methods associated with each of the plurality of customer codebases against a production release codebase of the host organization; generating a second test result set by executing the one or more test methods associated with each of the plurality of customer codebases against a pre-release codebase of the host organization; and identifying errors associated with the pre-release codebase based on a comparison of the first test result set and the second test result set.
    Type: Application
    Filed: December 20, 2010
    Publication date: November 24, 2011
    Applicant: Salesforce.com
    Inventors: FIAZ HOSSAIN, Richard Unger
  • Publication number: 20110276832
    Abstract: A method for processing a sequence of fault messages occurring in a device including many systems, makes it possible to discriminate between fault messages most likely originating from a real system fault and fault messages without any real fault in the associated system (no fault found), characterized in that the method combines: an “air-side” method (100) executed in real time for acquiring fault message data defining sequences stored in a fault database and for immediate diagnosis assistance using a diagnostics tool, and a “ground-side” method (200) for the subsequent analysis of fault sequence data and for improving the diagnostics tool.
    Type: Application
    Filed: November 16, 2009
    Publication date: November 10, 2011
    Applicant: EUROPEAN AERONAUTIC DEFENCE AND SPACE COMPANY EADS FRANCE
    Inventors: Nicolas Schneider, Sylvie Delprat
  • Publication number: 20110271150
    Abstract: Systems and methods of managing problem determination (PD) data provide for obtaining PD data from a plurality of data sources via an input/output (I/O) interface of a data management device and storing the PD data to a memory of the data management device. In addition, an automated diagnostic analysis of the PD data may be conducted on the data management device. An automated discovery manager may provide the ability to find new sources of PD data and to either reconfigure remote systems to send data to the data management device or to automatically retrieve data from remote systems on a configurable schedule. Dynamically updateable database of symptom information can also be used, wherein the data management device may include a dynamically updateable set of analysis modules with which to conduct analysis on the PD data.
    Type: Application
    Filed: April 30, 2010
    Publication date: November 3, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Donald A. Bourne, Roger M. Meli, Carolyn H. Norton, Thomas S. Wallace, Michael L. Wamboldt
  • Publication number: 20110271151
    Abstract: A method is provided for asynchronous notifications from a device to a host in systems without requiring hardware provision for asynchronous operations. In an embodiment of the invention, a system supports command queuing and a command is sent from a host to a device. The device receives the command and an associated tag, and accepts the command as valid. After accepting the command, the device begins monitoring for asynchronous events. If an asynchronous event is detected, the device provides notification of the event by sending a response and the associated tag to the host. In another embodiment of the invention, a method of asynchronous notification enables use of invalid tags. In a further embodiment of the invention, asynchronous notifications may be enabled by a host and operate without additional host commands.
    Type: Application
    Filed: April 30, 2010
    Publication date: November 3, 2011
    Applicant: WESTERN DIGITAL TECHNOLOGIES, INC.
    Inventor: Curtis E. Stevens
  • Publication number: 20110258493
    Abstract: A method, system, and computer usable program product for detecting a no progress state of an application are provided in the illustrative embodiments. A resource usage and an output of a set of applications are monitored. The resource usage and the output are measured to determine a resource usage value and an output value at a given time. A determination is made whether the resource usage value is included in a sub-range of a resource usage scale and the output value is included in a sub-range of an output scale where the sub-range of the resource usage scale corresponds to the sub-range of the output scale.
    Type: Application
    Filed: April 16, 2010
    Publication date: October 20, 2011
    Applicant: International Business Machines Corporation
    Inventors: Shmuel BEN-YEHUDA, Dan PELLEG, Lance Warren RUSSELL
  • Publication number: 20110239057
    Abstract: The centralized reporting of a service outage, where the service is offered over a network such as, for example, the Internet. Upon detecting a service outage, computing system automatically identifies characteristic(s) of the outage. Then, the computing system selects a way of reporting the outage that depends on the characteristic(s) of the outage. For instance, depending on the outage characteristic(s), the computing system might cause a particular communication channel or channels to be selected for reporting the outage. Alternatively or in addition, the content or structure of the report may differ depending on the characteristic(s) of the outage. The reporting mechanism may be centralized and service a number of other services, and even report regarding errors in the framework that supports the service.
    Type: Application
    Filed: March 26, 2010
    Publication date: September 29, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Mohan Thimmappa, Vani Mandava
  • Publication number: 20110239039
    Abstract: A system and a method for provisioning of Information Technology (IT) services to a plurality of computers is provided. The system includes a network and transport device and local IT resources. The network and transport device has internet connectivity via a controlled switching interface. One or more of the computers are coupled to the network and transport device via the controlled switching interface. The local IT resources are also coupled to the one or more computers and include data storage and processing capability for providing IT services to the computers including server-based applications for utilization and operation by the computers. In addition, the local IT resources include a network and transport virtual machine generated as a virtual machine equivalent of the network and transport device and coupled to the controlled switching interface of the network and transport device for communication with the network and transport device.
    Type: Application
    Filed: March 26, 2010
    Publication date: September 29, 2011
    Inventors: Devon C. Dieffenbach, Joel B. Wall, Robert T. Burke, JR., Jared Max Gross
  • Publication number: 20110231710
    Abstract: A mechanism for saving crash dump files of a virtual machine (VM) on a designated disk is disclosed. A method of embodiments of the invention includes configuring an operating system (OS) of a VM managed by a hypervisor of a host machine to store any crash dump files created by the VM to a designated crash dump virtual disk associated with the VM but accessible outside of operations of the VM, determining that the VM experienced a crash event, stopping operations of the VM, and obtaining a crash dump file created by the VM that details the crash event from the designated crash dump virtual disk.
    Type: Application
    Filed: March 18, 2010
    Publication date: September 22, 2011
    Inventor: Dor Laor
  • Publication number: 20110219270
    Abstract: A method for logging system characteristic data of a system is provided. The method includes receiving a plurality of system characteristic data points associated with a first time period of predetermined length, and generating a one or more first power sums from the plurality of system characteristic data points.
    Type: Application
    Filed: March 3, 2010
    Publication date: September 8, 2011
    Applicant: FUJITSU LIMITED
    Inventor: Martin Bouda
  • Publication number: 20110219266
    Abstract: In an embodiment, a method of testing an error correction scheme includes selectively observing and controlling data at one or more intermediate test points within an error correction circuit. Erroneous data may be selectively injected at a first intermediate test point and data related to the erroneous data may be observed at a second intermediate test point.
    Type: Application
    Filed: March 4, 2010
    Publication date: September 8, 2011
    Applicant: QUALCOMM Incorporated
    Inventors: Hari M. Rao, Shahzad Nazar, Venugopal Boynapalli
  • Publication number: 20110194563
    Abstract: A method and an apparatus of hypervisor level distributed load-balancing are disclosed. In one aspect, a method includes determining a location to direct a packet. The method also includes distributing the packet to process the packet through a processor. The method also includes assigning the packet to a guest such that a distribution of the packet to the guest is based on an algorithm. The method further includes altering a first destination address of the packet to a second destination address. The second destination address may be based on a virtual network interface of the guest. The method further includes convincing the guest the packet is from a virtual switch based on the second destination address. In addition, the method includes adjusting the distribution of the packet to the guest. The method also includes reducing a load of the guest through the adjustment.
    Type: Application
    Filed: June 3, 2010
    Publication date: August 11, 2011
    Applicant: VMWARE, INC.
    Inventors: Jianjun SHEN, Zhi Feng XIA, Mojiong QIU, Shudong ZHOU, Donghai HAN
  • Publication number: 20110179316
    Abstract: A data processing system 100 comprising a monitor 120 is provided and corresponding system-on-chip, method for monitoring and computer program product. The data processing system comprises multiple processing devices 104, 106, 116, 116 and a monitor 120. The monitor is configured to monitor characteristics of the data streams 102, 112, occurring among the plurality of data processing devices. The monitor comprises a means to determine whether a system characteristic substantially deviates from an expected system characteristic and to raise an anomaly signal if so. The system characteristic depends on the first characteristic and the second characteristic. In this way the monitor increases robustness by monitoring for problems related to deviations in the relation between multiple data streams.
    Type: Application
    Filed: September 22, 2009
    Publication date: July 21, 2011
    Inventors: Marc Jeroen Geuzebroek, Andre Krijn Nieuwland, Hubertus Gerardus Hendrikus Vermeulen
  • Publication number: 20110161395
    Abstract: According to an embodiment of the invention, a system to improve synthetic transaction monitoring and management scripts may include an object provided by a web-server. The system may also include a testing tool configured to interact with the object, set a verification point based upon the object, and collect contextual information about the object. The system may further include a synthetic transaction script configured to test the object's performance and availability based upon the testing tool's interactions with the object, the verification point, and the collected contextual information about the object.
    Type: Application
    Filed: December 24, 2009
    Publication date: June 30, 2011
    Applicant: International Business Machines Corporation
    Inventors: James P. O'Donnell, III, Rama S. Vykunda
  • Publication number: 20110154124
    Abstract: The method of tracking the evolution of a physical quantity comprises: a step of storing a plurality of dates of transmissions of numerical values requested by requests issued by so-called “requesting” entities destined for the same so-called “issuing” entity sending numerical values, for each so-called transmission actually carried out subsequent to a so-called request, a step of storing the date of transmission and a step of determining the lag between the date of the actual transmission and the corresponding requested transmission date, for each of a plurality of predetermined durations, a step of determining a statistical quantity representative of the so-called lags, a step of determining the evolution of said statistical quantity between at least two of the so-called predetermined durations and a step of comparing said evolution with a predetermined limit value.
    Type: Application
    Filed: May 12, 2009
    Publication date: June 23, 2011
    Inventor: Eric Blot-Lefevre
  • Publication number: 20110145657
    Abstract: A method for facilitating forensic analysis of operational data for an IT infrastructure includes deriving performance data from a plurality of physical systems, network elements and storage devices in an IT infrastructure via a toolset comprising a plurality of IT monitoring and metrics tools, importing the performance data into an integrated forensics platform, aggregating the imported data, and analyzing the aggregated data to determine resources consumed. Each tool is communicatively interfaced with one or more of the physical systems, network elements and storage devices.
    Type: Application
    Filed: October 6, 2010
    Publication date: June 16, 2011
    Inventors: Anthony Bennett Bishop, Paul John Wanish, Alexis Salvatore Pecoraro, Sheppard David Narkier
  • Publication number: 20110138235
    Abstract: A method and a system are provided for reporting policy installation failures in the field of communications. The method and system enable the policy decision functional entity (PD-FE) to accurately obtain detailed information of policy installation failures of the policy enforcement functional entity (PE-FE), thus enhancing the efficiency of sending the next policy for installation. The method includes: when the installation of a policy sent from the PD-FE to the PE-FE is failed, the PE-FE generates a feedback message to be sent to the PD-FE, and the feedback message includes the error reason of the policy failed in installation.
    Type: Application
    Filed: December 24, 2008
    Publication date: June 9, 2011
    Applicant: ZTE CORPORATION
    Inventors: Jianjie You, Tong Rui
  • Publication number: 20110131448
    Abstract: A technique of performing a workflow on a plurality of task servers involves starting a plurality of task server processes on the plurality of task servers. Each task server provides an operating system which is constructed and arranged to locally run a respective task server process. The technique further involves receiving a workflow which includes a set of dependency-related predefined activities, and placing task identifiers in a queue structure based on the received workflow. The task identifiers identify tasks to be performed in a distributed manner by the plurality of task server processes started on the plurality of task servers. Each task is a specific execution of a dependency-related predefined activity of the workflow. Progress in performing the workflow is made as the plurality of task server processes (i) claim task identifiers from the queue structure and (ii) perform the tasks identified by the claimed task identifiers.
    Type: Application
    Filed: November 30, 2009
    Publication date: June 2, 2011
    Applicant: IRON MOUNTAIN, INCORPORATED
    Inventors: Timothy J. Vasil, Philip Notick
  • Publication number: 20110126065
    Abstract: A method for monitoring the execution of a sequence of instruction codes in an integrated circuit comprising a central processing unit provided for executing such instruction codes. Current cumulative signatures are produced using deterministic address, control or data logic signals involved in the execution of the sequence and taken off at various points of the integrated circuit. A final cumulative signature is compared with an expected signature and an error signal is produced if the two signatures are not identical. Particularly useful to secure integrated circuits for smart cards.
    Type: Application
    Filed: February 1, 2011
    Publication date: May 26, 2011
    Applicant: STMICROELECTRONICS SA
    Inventors: Frédéric Bancel, Nicolas Berard
  • Publication number: 20110119530
    Abstract: A computer system includes a plurality of computer processor dependent nodes and a plurality of computer processor antecedent nodes. Each node includes a severity value relating to an operational state of the node. A dependent node and an antecedent node pair include a significance value relating to a criticality that the antecedent node has to its paired dependent node. The antecedent node comprises a relevance value, wherein the relevance value is a function of the severity value of the antecedent node and the significance value for the antecedent node and the dependent node. The relevance value is used to determine an impact that the antecedent node has on the paired dependent node.
    Type: Application
    Filed: November 17, 2009
    Publication date: May 19, 2011
    Applicant: Computer Associates Think, Inc.
    Inventor: Peter Anthony Lazzaro
  • Publication number: 20110107155
    Abstract: A network fault detection apparatus includes: data distribution learning units (2, 3, 4, and 5) that take, as input, data in which the state of the network is expressed by matrix variables of a hierarchical structure and that learn the state of the network as the probability distribution of the matrix variables, and fault detection units (6 and 7) that, based on the result of learning by the data distribution learning unit, detect, as a network fault, a state in which the probability distribution transitions from a distribution that indicates the normal state of the network to a distribution that indicates another state.
    Type: Application
    Filed: January 13, 2009
    Publication date: May 5, 2011
    Inventors: Shunsuke Hirose, Kenji Yamanishi
  • Publication number: 20110107154
    Abstract: Managing a computer system including automatically adjusting two separate component thresholds (a component threshold pair) based on a statistical model. Specifically, a first component threshold is modeled to predict violations of an SLO based on a violation of the first component threshold and a second, separate component threshold is modeled to predict a non-violation (compliance) of an SLO based on a non-violation of the second component threshold. Over time, the values of the component thresholds may change and one component threshold may be greater than the other component threshold at one time, and vice versa at another time. A component metric reading between the first and second component thresholds indicates that a prediction of an SLO violation or compliance is less certain, and a warning may be issued rather than an alert.
    Type: Application
    Filed: November 3, 2009
    Publication date: May 5, 2011
    Inventors: David Breitgand, Maayan Goldstein, Ealan Abraham Henis, John Michael Lake, Onn Shehory
  • Publication number: 20110099433
    Abstract: An information generating apparatus, includes: a process executing part that executes at least one process using a battery as a power source; a power detecting part that detects power consumption of the battery; a consumption determining part that determines whether the power consumption is equal to or more than a specified threshold; an acquisition part that specifies a process executed by the process executing part when the power consumption is equal to or more than the specified threshold; and a generating part that generates execution state information about the specified process.
    Type: Application
    Filed: October 26, 2010
    Publication date: April 28, 2011
    Applicant: FUJITSU LIMITED
    Inventors: Kazuki MATSUI, Shingo Fujimoto
  • Publication number: 20110093726
    Abstract: A computer system may manage objects in memory to consolidate less frequently accessed objects into memory regions that may be operated in a low power state where the access times may increase for the memory objects. By operating at least some of the memory regions in a low power state, significant power savings can be realized. The computer system may have several memory regions that may be independently controlled and may move memory objects to various memory regions in order to optimize power consumption. In some embodiments, an operation system level function may manage memory objects based on parameters gathered from usage history, memory topology and performance, and input from applications.
    Type: Application
    Filed: October 15, 2009
    Publication date: April 21, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Bruce L. Worthington, Stephen R. Berard, Sean N. McGrane
  • Publication number: 20110078513
    Abstract: Methods, systems, and products are disclosed for predicting failures in power supplies. A count of exception messages is set to zero. When a exception message is received, the count of exception messages is incremented and compared to a threshold value. When the count of exception messages equals the threshold value, a cooling fan is determined to be failed, and a prediction is made that a power supply is proceeding towards failure.
    Type: Application
    Filed: September 28, 2009
    Publication date: March 31, 2011
    Inventors: James Gordon Beattie, JR., Paritosh Bajpay, Stephen J. Griesmer, Martin Tusi
  • Publication number: 20110072298
    Abstract: An information processing device includes SBs; an XBB for executing data transfer between the SBs; and an SCF for managing and controlling the SBs and the XBB. The SB includes a transmitting/receiving unit for transmitting a notification packet indicating occurrence of an error via the XBB when detecting the occurrence of the error. The SCF includes an executing unit for executing a configuration change process corresponding to an instruction when detecting the instruction related to the SB, a suspending unit for suspending acceptance of an error report from the SB in which the error occurs during execution of the configuration change process and an XBB controller for controlling the XBB to destroy the notification packet received from the SB of which configuration change process is being executed and controlling the XBB to inhibit transfer of the notification packet to the SB of which configuration change process is being executed.
    Type: Application
    Filed: November 23, 2010
    Publication date: March 24, 2011
    Applicant: FUJITSU LIMITED
    Inventor: Yasuhiro Kuroda
  • Publication number: 20110072313
    Abstract: The invention relates to a system for providing fault tolerance for at least one micro controller unit, hereinafter called MCU (10). The MCU receives information from at least one sensor (11) coupled to the MCU (10) and outputs information to at least one actuator (12) coupled to the MCU (10). To provide a system for controlling or influencing the fault tolerance or the error processing of at least one MCU without requiring a replication of software or hardware components and which is able to react differently on various events it is proposed to include a System Supervision unit (200), hereinafter called SSU (200), in the MCU (10).
    Type: Application
    Filed: August 7, 2008
    Publication date: March 24, 2011
    Applicant: NXP B.V.
    Inventors: Peter Fuhrmann, Markus Baumeister, Manfred Zinke
  • Publication number: 20110072314
    Abstract: A computer system and a monitoring device for a computer system are disclosed. The computer system includes a plurality of electronic modules, a memory module and an embedded controller. The embedded controller is coupled to the electronic modules and the memory module, respectively. The embedded controller collects information of the electronic modules and generates the system information about the electronic modules. The embedded controller selectively writes the system information into the memory module. The system information in the memory module can be provided to the user or the maintenance engineer for system analysis. Besides, the computer system may utilize an application program to monitor the system information, so as to achieve the error prevention and alert function.
    Type: Application
    Filed: September 16, 2010
    Publication date: March 24, 2011
    Inventors: Li Chien Wu, Pai Ching Huang
  • Publication number: 20110072315
    Abstract: A method for monitoring the quality-of-service (QoS) of high priority transactions in a software system includes receiving a specific QoS metric of a high priority transaction, where the QoS metric associated with a plurality of buckets and comparing the sampled specific QoS metric to an expected value for the specific QoS metric. If the sampled specific QoS metric exceeds the corresponding expected value, a bucket for the specific QoS metric is incremented, otherwise the bucket is decremented. If the bucket for the specific QoS metric overflows, the current bucket is reinitialized to zero, a depth of a next bucket for the specific QoS metric is computed, and a number of standard deviations from a mean value for the specific QoS metric is incremented. When the bucket for the specific QoS metric exceeds a threshold, a software rejuvenation routine is executed.
    Type: Application
    Filed: November 19, 2010
    Publication date: March 24, 2011
    Applicant: Siemens Corporation
    Inventor: Alberto Avritzer
  • Publication number: 20110066896
    Abstract: A network interface (101) includes: a packet receiving unit (103); a packet buffer (105); and a transfer unit (106) which transfers packets accumulated in the packet buffer to a main memory (102), and further including: an attack detecting unit (107) which detects an attack in which a large number of packets is transmitted, based on an accumulated amount of packets in the packet buffer (105); a table storing unit (110) for storing an attack packet table (109) in which attack packet identification information is registered; an update unit (108) which updates the attack packet table (109), using information obtained from the packets accumulated in the packet buffer; and a discarding unit (104a) which discards the packets received by the packet receiving unit (103) when the packets correspond to the updated attack packet information, before the packets are transferred to the main memory.
    Type: Application
    Filed: May 14, 2009
    Publication date: March 17, 2011
    Inventors: Akihiro Ebina, Atsuhiro Tsuji
  • Publication number: 20110041143
    Abstract: A mechanism is provided for automatically closing a file or a device. A service routine monitor monitors a request received from either an application that opened the file or a device driver that readied the device. The service routine monitor determines whether the file or the device has been accessed within a predetermined time interval. Responsive to the file or the device failing to be accessed within the predetermined time interval, the service routine monitor sends a call to the application that opened the file or the application or a higher level device driver that requested that the device driver ready the device. Responsive to a response from the application or the higher level device driver indicating that the use of the file or the device is no longer needed, the service routine monitor closes the file or quiesces the device.
    Type: Application
    Filed: August 13, 2009
    Publication date: February 17, 2011
    Applicant: International Business Machines Corporation
    Inventors: Jos M. Accapadi, Brian W. Hart, Anil Kalavakolanu, Steven F. Lang
  • Publication number: 20110029822
    Abstract: In various example embodiments, a system and associated method to identify an instruction in program code associated with a memory leak in an architecture-neutral, language-based (e.g., Java®) enterprise application platform is disclosed. In an example embodiment of a method, the method comprises performing an allocation trace of program execution and a heap dump of memory used by the program, identifying potentially leaking data structures, identifying objects in the allocation trace associated with the potentially leaking data structures based on unique object identifiers, and identifying locations in the program code where the objects were created.
    Type: Application
    Filed: August 3, 2009
    Publication date: February 3, 2011
    Applicant: SAP AG
    Inventor: Martin Moser
  • Publication number: 20100332902
    Abstract: An electronic device comprises a first processor, a computer readable memory medium and logic instructions stored in the computer readable medium which, when executed by the first processor, configure the first processor to implement a watchdog module which monitors an operating status of one or more critical processes executing on the first processor and implements a recovery process when the one or more of the critical processes executing on the first processor fails. The device further comprises a system controller unit coupled to the first processor by a communication bus, wherein system controller unit activates the watchdog module periodically and only when the first processor is in at least one predetermined power state. Other embodiments may be described.
    Type: Application
    Filed: June 30, 2009
    Publication date: December 30, 2010
    Inventors: Rajesh Banginwar, Rajesh Kapoor, Bruce L. Fleming
  • Publication number: 20100332889
    Abstract: Information Technology Risk to an organization is associated with a plurality of virtual machines (VMs) each running on a plurality of hosts, each host being a computer system connected to a network and in communication with a risk orchestrator, which receives threat indication messages (TIMs) from threat indicators. Each TIM indicates a status of a threat to which a hosts is vulnerable. Downtime probability (DTP) resulting from the threat and an overall host DTP for each host are calculated. For each VM, a risk value associated with the VM is calculated as a function of the host DTP for and an impact for the VM, the impact being a value reflecting a relative importance of the VM to the organization. Each VM requiring risk mitigation is identified and prioritized in accordance with a policy, and a configured mitigation control action may be carried out for each VM requiring risk mitigation.
    Type: Application
    Filed: June 25, 2009
    Publication date: December 30, 2010
    Applicant: VMWARE, INC.
    Inventors: Oren SHNEORSON, Jeffrey J. HANSON, Corey Pace CAUDLE
  • Publication number: 20100332908
    Abstract: A network adaptor which performs CPU loads and stores to remote memory over network fabrics. The network adaptor receives a transfer request from a compute node and converts the request to a remote transfer request, which is transmitted to the network. The network adaptor then monitors the network connection for a remote completion response. When the network adaptor receives the remote completion response within a specific time period, the network adaptor transmits a first completion response to the compute node. If the network adaptor does not receive the remote completion response within the specific time period, the network adaptor transmits an “early completion response” to the compute node. The network adaptor continues to monitor for the actual response. This allows the compute node to continue processing without having to wait for the actual response to be received. The method handles small payloads efficiently and also accounts for long completion delays.
    Type: Application
    Filed: June 30, 2009
    Publication date: December 30, 2010
    Inventors: Bjorn Dag Johnsen, Rabin A. Sugumar, Ola Torudbakken
  • Publication number: 20100318857
    Abstract: An autonomic computing system is automatically maintained in a steady state. The system has a number of parameters, each of which has one or more threshold. The system may further have a number of influencers, adjustment of which affects values of the parameters. One or more of the parameters are determined as each reaching one of its threshold, and are referred to as to-be-affected parameters. Each to-be-affected parameter is identified and its thresholds identified. A correlation value may be determined between each influencer and each to-be-affected parameter, and/or between each to-be-affected parameter and each other to-be-affected parameter. The to-be-affected parameters are adjusted, based on the correlation values determined, so that the to-be-affected parameters return to more-normal values.
    Type: Application
    Filed: August 22, 2010
    Publication date: December 16, 2010
    Inventor: Hulikunta Prahlad Raghunandan
  • Patent number: 7853928
    Abstract: In an embodiment, virtual trace records are read and physical trace records are created and displayed. The virtual trace records are associated with virtual processors allocated to logical partitions in a logically-partitioned computer system. Each of the virtual trace records has a wait timestamp, specifying a time at which a virtual processor began waiting to be dispatched and a wait time delta, specifying an amount of time that the virtual processor waited to be dispatched. An execute timestamp is created in each of the virtual trace records, which specifies a time at which the virtual processor was dispatched. The virtual trace records are sorted for each of the virtual processors by the execute timestamp. Physical trace records are created based on the sorted virtual trace records. Each physical trace record describes a dispatch of one of the virtual processors to one of the physical processors.
    Type: Grant
    Filed: April 19, 2007
    Date of Patent: December 14, 2010
    Assignee: International Business Machines Corporation
    Inventor: John Eric Attinella