Recording Or Statistical Evaluation Of Computer Activity, E.g., Of Down Time, Of Input/output Operation, Etc. (epo) Patents (Class 714/E11.189)
  • Publication number: 20140122930
    Abstract: Diagnostic tests are performed in a data center that includes servers of various types and a management console, where each server provides an error log in a format specific to the type of the server. The management console receives an error log indicating an error produced by a hardware component, parses the error log into an error notification that describes the error and a type of the hardware component, and provides the error notification to other servers. Each of the other servers determines whether the server includes a hardware component of the same type, and if so, performs one or more diagnostic tests on the hardware component and reports results of the diagnostic tests to the management console.
    Type: Application
    Filed: October 25, 2012
    Publication date: May 1, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: SANTOSH DEVALE, RAJAT Y. JOSHI, VISHAL KULKARNI, VENKATESH SAINATH
  • Publication number: 20140101494
    Abstract: A method of tracking repeated performance problems in a machine is disclosed. The method comprises storing the faults in a computer memory, and assigning a classification value to the machine based on the frequency and number of the faults. Based on the classification value of the cash handing device it is determined whether the cash handing device needs to be serviced. The faults can be related to one of the hardware, the cash reject rate, image handling, crash rate, user claim rate, and check handling accuracy of the machine.
    Type: Application
    Filed: October 10, 2012
    Publication date: April 10, 2014
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Cheryl S. Bond, Rebecca L. Bell, Dion L. Bellamy, Pat Burton, Kristy M. Crist, Carol Giordano, James D. Goodwin, Jeffrey Hipple, Maggie M. Peretto, Devin D. Rhodes, Karen Y. Stavinoha, Susan A. Wilson
  • Publication number: 20140075248
    Abstract: When a software component is starting (305), such as but not limited to a task or a subtask, the component pushes (310) its identification (ID) onto a stack. The component then executes (315) its other instructions. If the component completes its instructions so that it can terminate normally (320), then it pops (325) the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, then it will not be able to pop the stack so its ID will remain in the stack. Another software process can then read the IDs in the stack to identify (330) which components have failed and can automatically take a specified action (335), such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component.
    Type: Application
    Filed: September 13, 2012
    Publication date: March 13, 2014
    Applicant: Microsoft Corporation
    Inventors: Tarkan Sevilmis, Arshish Cyrus Kapadia, Maxim Lukiyanov, Tittu Jose, Gheorghita Irimescu, Janak Madhusudan Agarwal, Stephen John Clark, Hardik Shah, Sreekanth Lingannapeta
  • Publication number: 20140059391
    Abstract: A method, computer program product, and computer system for receiving, by a processor, an initiation indication that a test is initiating on a computing device. A logging process is activated to record to a log one or more log messages generated as a result of the test in response to receiving the initiation indication that the test is initiating. A completion indication is received that the test is complete. The logging process is deactivated to stop recording to the log in response to receiving the completion indication that the test is complete. The one or more log messages are associated with the test in response to receiving the completion indication that the test is complete.
    Type: Application
    Filed: August 27, 2012
    Publication date: February 27, 2014
    Applicant: International Business Machines Corporation
    Inventors: PHILIP SEIK POON CHAN, Matthew J. Ponsford
  • Publication number: 20140053027
    Abstract: An integrated circuit with debug capability includes a first packer and synchronizer to combine a multiple number of values of a first trigger signal received from a first circuit to form a first packed trigger signal and to output a synchronized first packed trigger signal in response to a trigger clock signal, the first trigger signal being synchronous with a first source clock signal, a first logic gate to provide a first output trigger signal indicative of whether any of the first multiple number of values of the first trigger signal in the first synchronized packed trigger signal is in a first state, and a debug state machine responsive to the first output trigger signal to selectively provide a first action signal.
    Type: Application
    Filed: August 16, 2012
    Publication date: February 20, 2014
    Applicant: ADVANCED MICRO DEVICES, INC.
    Inventors: Scott P. Nixon, Eric M. Rentschler
  • Publication number: 20140040672
    Abstract: Methods and structure are provided for trapping incoming requests directed to hardware registers of an electronic device. The electronic device that comprises a set of hardware registers that define a configuration of the electronic device, circuitry that implements programmable logic defining which hardware registers have been flagged for trapping incoming requests, and a shadow memory that includes values corresponding to the flagged hardware registers. The circuitry is further operable to access a value in shadow memory that corresponds to a flagged hardware register, responsive to receiving a request from an external device to access the flagged hardware register.
    Type: Application
    Filed: August 6, 2012
    Publication date: February 6, 2014
    Applicant: LSI CORPORATION
    Inventors: Eugene Saghi, Richard Solomon
  • Publication number: 20140040671
    Abstract: In a computer storage system, crash dump files are secured without power fencing in a cluster of a plurality of nodes connected to a storage system. Upon an occurrence of a panic of a crashing node and prior to receiving a panic message of the crashing node by a surviving node loading, in the cluster, a capturing node to become active, prior to a totem token being declared lost by the surviving node, for capturing the crash dump files of the crashing node, while manipulating the surviving node to continue to operate under the assumption the power fencing was performed on the crashing node.
    Type: Application
    Filed: July 31, 2012
    Publication date: February 6, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shay AKIRAV, Roman BARSKY, Rafael BUCHBINDER, Dan MELAMED
  • Publication number: 20140032974
    Abstract: A method of managing a debug trace data stream by detecting conditions where the trace data generated exceeds the available transmission bandwidth, and inserting a trace data gap into the trace data stream. The gap may contain additional information relating to the amount and type of data that is being lost during the overflow condition. In an alternate embodiment the generated trace may be throttled to ensure the available bandwidth is not exceeded.
    Type: Application
    Filed: July 25, 2012
    Publication date: January 30, 2014
    Applicant: TEXAS INSTRUMENTS INCORPORATED
    Inventor: Jason L. Peck
  • Publication number: 20140006874
    Abstract: Provided are a computer program product, system, and method for managing traces to capture data for memory regions in a memory. A trace includes a monitor parameter used by a trace procedure to monitor data in a memory device. A frequency is determined at which the trace procedure monitors the memory device. The trace procedure is invoked at the determined frequency to perform trace procedure operations comprising determining a region in the memory device according to the monitor parameter and copying data in the determined region to trace data in a data space.
    Type: Application
    Filed: June 27, 2012
    Publication date: January 2, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Neal E. Bohling, Joseph V. Malinowski, David C. Reed, Max D. Smith
  • Publication number: 20140006875
    Abstract: Transactions in a multi-component system have corresponding local identifiers uniquely identifying the transaction among transactions within a particular functional block of the device under test. For each transaction, it is determined whether the transaction is a new request, a handshake request corresponding to a previously generated request, or a response. In response to determining that a transaction of the plurality of transactions is a new request, a global identifier is assigned to the new request which uniquely identifies the new request among new requests of all functional blocks of the device under test. A global entry corresponding to the new request is stored that includes the global identifier of the new request, an indicator of a functional block of the device under test which generated the new request, and a local identifier uniquely identifying the new request within the first functional block.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 2, 2014
    Inventors: VIVEKANANDA M. VEDULA, Jayanta Bhadra
  • Publication number: 20130346806
    Abstract: Data fields within a trace data set are interpreted by a processor using a data field declaration of each data field that identifies a data type of the respective data field. An actual data value of the interpreted data field is compared with the data field declaration for each interpreted data field. Based upon each comparison, a determination is made as to whether the actual data value of the interpreted data field contains an erroneous data value based upon the data field declaration.
    Type: Application
    Filed: June 21, 2012
    Publication date: December 26, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Stephen J. Burghard, David J. Harman, Neil W. Leedham, Andrew Wright
  • Publication number: 20130339803
    Abstract: A process for managing interrupts, which may be performed using electronic circuitry, includes: receiving interrupts bound for a processing device, where the interrupts are received from hardware devices that are configured to communicate with the processing device; generating data containing information corresponding to the interrupts; and sending the data to the processing device.
    Type: Application
    Filed: June 19, 2012
    Publication date: December 19, 2013
    Inventors: David Vandervalk, Lloyd K. Frick
  • Publication number: 20130339802
    Abstract: A method and system for tracing in a data processing system. The method includes receiving a plurality of signals associated with an operation during execution of the operation. The method also includes, in response to an indication that the operation is a multiphase operation, during execution of the operation, selection logic, during a first phase of the multiphase operation, selecting and outputting as a trace signal a first signal of the plurality of signals, and during a second phase of the multiphase operation, selecting and outputting as the trace signal a second signal of the plurality of signals.
    Type: Application
    Filed: June 15, 2012
    Publication date: December 19, 2013
    Applicant: International Business Machines Corporation
    Inventors: Steven R. Carlough, Juergen Haess, Michael K. Kroener, Silvia M. Mueller
  • Publication number: 20130332778
    Abstract: The current application is directed to architected hardware support within computer processors for detecting and monitoring various types of potential performance imbalances with respect to simultaneously executing hardware threads in simultaneous multi-threading (“SMT”) processors and SMT-processor cores. The architected hardware support may include various types of performance-imbalance-monitoring registers that accumulate indications of performance imbalances and that can be used, by performance-monitoring software and by human analysts to detect performance-degrading conflicts between simultaneously executing hardware threads. Such conflicts can be ameliorated by changing the scheduling of virtual machines, tasks, and other computational entities, by redesigning and re-implementing all or portions of performance-limited and performance-degrading applications, by altering resource-allocation strategies, and by other means.
    Type: Application
    Filed: June 7, 2012
    Publication date: December 12, 2013
    Applicant: VMware, Inc.
    Inventor: Lawrence Andrew Spracklen
  • Publication number: 20130290787
    Abstract: A method for recording managing SELs of a server includes the following steps. Periodically determining a current number of the SELs stored in a storage unit of the server. Comparing the current number with a historical number to determine newly generated SELs. If the current number is greater than the historical number, determining whether the storage unit is full. If the storage unit is full, controlling the BMC to transfer the newly generated SELs to a cache unit. The stored SELs are erased in the storage unit. Transferring the SELs in the cache unit to the storage unit when the SELs in the storage unit are erased. The historical number is updated.
    Type: Application
    Filed: July 27, 2012
    Publication date: October 31, 2013
    Applicants: HON HAI PRECISIION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) CO., LTD.
    Inventors: XIAN-KUI CHEN, HAI-LI WANG
  • Publication number: 20130227350
    Abstract: Recording and playback of trace log data and video log data for programs is described. In one aspect, a method for viewing log data recorded during execution of a program includes causing a display of recorded images depicting prior visual user interaction with the program during a particular time period. The method also includes causing a display of messages tracing and describing prior execution of the program during the particular time period. The display of the messages and the display of the recorded images are synchronized.
    Type: Application
    Filed: February 23, 2012
    Publication date: August 29, 2013
    Applicant: Cadence Design Systems, Inc.
    Inventors: Donald J. O'RIORDAN, David VARGHESE
  • Publication number: 20130219228
    Abstract: Automated testing of application software is performed by recording the output of at least one sensor that produces sensor information. A harnessed app being tested requests sensor information. Those requests are intercepted and recorded information that corresponds to the requested sensor information is retrieved and sent to the harnessed app as sensor information.
    Type: Application
    Filed: February 17, 2012
    Publication date: August 22, 2013
    Applicant: WAVEMARKET, INC.
    Inventor: Brian Martin
  • Publication number: 20130198571
    Abstract: A system and method for processing data for use with a microcontroller having a processing unit provides for sending an input data address to a memory as part of a read request for input data stored in the memory, receiving the input data from the memory, generating a plurality of trace signals, generating a first plurality of signatures based upon the plurality of trace signals, receiving a second plurality of corresponding signatures from a second microcontroller, comparing each signature of the first plurality of signatures to each corresponding signature of the second plurality of corresponding signatures, generating a first error signal if the comparison produces at least one mismatch, and utilizing the first error signal to generate one or more disable signals for disabling operation of one or more devices under control of the microcontroller.
    Type: Application
    Filed: January 31, 2012
    Publication date: August 1, 2013
    Applicant: Infineon Technologies AG
    Inventors: Simon Brewerton, Neil Hastie, Glenn Farrall, Boyko Traykov, Antonio Vilela
  • Publication number: 20130198574
    Abstract: A method and system for providing autonomous event logging and retrieval for failure analysis. In one implementation, storage device firmware monitors and records events (e.g., storage device errors and/or failures) to the storage device flash in substantially real time from power on of the storage device to power off. Additionally, diagnostic data relating to an event, including a time stamp and storage device environmental conditions are recorded. The logged event data may be utilized to streamline failure analysis by determining whether the storage device failed and if so, when the storage device failed and what the conditions of the storage device were at the time of the failure. Such information may be used for failure, warranty, integrator, and/or troubleshooting analysis.
    Type: Application
    Filed: January 27, 2012
    Publication date: August 1, 2013
    Applicant: SEAGATE TECHNOLOGY LLC
    Inventors: Brian John Higley, Bradley John Gill
  • Publication number: 20130185600
    Abstract: Dynamically collecting data pertaining to a program execution. A method can include monitoring execution of the program in a plurality of threads and, responsive to identifying an exception triggered by the program execution in a first of the plurality of threads, initiating at least one data collector to collect data exclusively relevant to the program execution in the first thread.
    Type: Application
    Filed: January 12, 2012
    Publication date: July 18, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: PETER R. MACFARLANE
  • Publication number: 20130185601
    Abstract: In accordance with one aspect of the invention, a system for generating compact function trace data for leaf functions includes a central processing unit (CPU), configured to output program flow information needed for generating a program flow trace, and a trace unit, coupled to the CPU. The trace unit is configured to receive the program flow information from the CPU for generating compact function trace data. The trace unit further comprises a first output mode and a second output mode and is further configured to select either the first output mode or the second output mode for generating compact function trace data.
    Type: Application
    Filed: January 18, 2012
    Publication date: July 18, 2013
    Applicant: Infineon Technologies AG
    Inventors: Albrecht Mayer, Harry Siebert
  • Publication number: 20130185602
    Abstract: Detection of heap dump occurrence is facilitated through maintenance of a heap dump location registry. The heap dump location registry indicates tools for which heap dump occurrence is to be detected. Based on periodically referencing the heap dump location registry, it is determined whether heap dump of a tool of the one or more tools has occurred. In one embodiment, startup and shutdown events of the tool are tracked to update execution status and process identifiers in the heap dump location registry, and the periodically references determines based on the indicators whether heap dump has occurred for the tool. In another embodiment, a heap dump location for heap dumps of the tool is obtained from the registry and the heap dump location is checked for the presence of heap dump files, which presence indicates occurrence of a heap dump for the tool.
    Type: Application
    Filed: January 18, 2012
    Publication date: July 18, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ahamed JALALDEEN, Ashish MUNGI
  • Publication number: 20130159782
    Abstract: Example systems and methods of generating and distributing user-specified application information are presented. In one example, an informational code to be generated during execution of a software application is accessed. A character string specified by a first user of the software application that is descriptive of the informational code is received. The informational code and the character string are stored in a data storage device, which stores a plurality of information codes in association with corresponding character strings for the software application. The informational code is received in response to the first information code being generated during execution of the software for a second user. The character string is retrieved from the data storage device after the execution of the application based on the informational code, and transmitted for display to the second user.
    Type: Application
    Filed: December 20, 2011
    Publication date: June 20, 2013
    Applicant: Business Objects Software Ltd.
    Inventor: Radim Bacinschi
  • Publication number: 20130159781
    Abstract: A method of tracing processor instructions includes forming a compressed trace stream with a dynamic unit width indicator and a value block. The dynamic unit width indicator includes an address/data width indicator qualified by a unit indicator. The unit value block has a width that is a function of the address/data width indicator and the unit indicator.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 20, 2013
    Applicant: MIPS TECHNOLOGIES, INC.
    Inventor: James Hippisley Robinson
  • Publication number: 20130151899
    Abstract: A debug system includes a debug device and a computer. The debug device includes a decoding module, a first storing module, a first control module; and a signal receiving and transmitting module. The computer includes a second control module, a second storing module, and a display module. The decoding module decodes data from the LPC bus. The first storing module stores decoded data. The second control module sends a set address data to the first control module via the signal receiving and transmitting module. The first control module obtains a corresponding data from the first storing module according to the set address data and send the corresponding data to the second control module via the signal receiving and transmitting module. The second control module stores the corresponding data to the second storing module and displays the corresponding data on the display module.
    Type: Application
    Filed: July 31, 2012
    Publication date: June 13, 2013
    Applicants: HON HAI PRECISION INDUSTRY CO., LTD., HONG FU JIN PRECISION INDUSTRY (ShenZhen) Co., LTD
    Inventor: KANG-BIN WANG
  • Publication number: 20130097463
    Abstract: An approach to root cause determination in a complex systems based on monitoring and event data is disclosed. It includes a historical analysis of events with their probabilistic correlations. Applying information measures between the random variables which embody those events one can detect origins of problems and generate real-time recommendations for their locations in a hierarchical system. Estimation of system bottlenecks, as well as the risk of “black swan”-type events are also computed. The processes are based on a statistical processing of a virtual directed graph produced from historical events.
    Type: Application
    Filed: October 12, 2011
    Publication date: April 18, 2013
    Applicant: VMWARE, INC.
    Inventors: Mazda A. MARVASTI, Arnak POGHOSYAN, Ashot HARUTYUNYAN, Naira GRIGORYAN
  • Publication number: 20130086411
    Abstract: Various exemplary embodiments relate to a method and related network node including one or more of the following: identifying a hardware failure of a failed component of a plurality of hardware components; determining a set of agent devices currently configured to utilize the failed component; reconfiguring an agent device to utilize a working component of the plurality of hardware components. Various exemplary embodiments additionally or alternatively relate to a method and related network node including one or more of the following: projecting a failure date for the hardware module; determining whether the projected failure date is acceptable based on a target replacement date for the hardware module; if the projected failure date is not acceptable: selecting a parameter adjustment for a hardware component, wherein the parameter adjustment is selected to move the projected failure date closer to the target replacement date, and applying the parameter adjustment to the hardware component.
    Type: Application
    Filed: September 30, 2011
    Publication date: April 4, 2013
    Applicant: Alcatel-Lucent USA, Inc.
    Inventors: Eric J. Bauer, Randee S. Adams, William D. Reents, Mark M. Clougherty
  • Publication number: 20130061096
    Abstract: A method and system for collecting data for diagnosing a failure of a computer hardware device. After an indication of the failure of the computer hardware device that results in a full system crash is received, an address translation table of a central processing unit (CPU) of the computer hardware device is collected. A format of call stack frames of an operating system (OS) image of the computer hardware device is retrieved. Based on the collected address translation table and the retrieved format of the plurality of call stack frames, the call stack frames are retrieved and output to a computer file.
    Type: Application
    Filed: September 7, 2011
    Publication date: March 7, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Doyle J. McCoy
  • Publication number: 20130055032
    Abstract: A method for priority buffering of trace data in a computing system includes receiving instances of trace data by a priority assignment module, the trace data being generated by events that occur during execution of computer software in the computing system; assigning a priority to each instance of trace data, wherein the priority is assigned based on the event that generated the instance of trace data; and inserting the instances of trace data into a plurality of priority buffers based on their respective assigned priorities.
    Type: Application
    Filed: August 25, 2011
    Publication date: February 28, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Gary L. Cole, Michael J. Howland, Paul E. Rogers
  • Publication number: 20130031420
    Abstract: Mechanisms, in a processor chip, are provided for obtaining debug data from on-chip logic of the processor chip while the processor chip is in a secure mode of operation. The processor chip is placed into a secure mode of operation in which access to internal logic of the processor chip to control the internal logic of the processor chip, by mechanisms external to the processor chip, is disabled on a debug interface of the processor chip. A triggering condition of the processor chip is detected that is a trigger for initiated debug data collection from the on-chip logic. Debug data collection is performed from the on-chip logic to generate debug data. Data is output, by the processor chip to an external mechanism, on the debug interface based on the debug data.
    Type: Application
    Filed: June 12, 2012
    Publication date: January 31, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Frank Haverkamp, Heiko Michel, Joerg-Stephan Vogt
  • Publication number: 20130031419
    Abstract: Mechanisms, in a processor chip, are provided for obtaining debug data from on-chip logic of the processor chip while the processor chip is in a secure mode of operation. The processor chip is placed into a secure mode of operation in which access to internal logic of the processor chip to control the internal logic of the processor chip, by mechanisms external to the processor chip, is disabled on a debug interface of the processor chip. A triggering condition of the processor chip is detected that is a trigger for initiated debug data collection from the on-chip logic. Debug data collection is performed from the on-chip logic to generate debug data. Data is output, by the processor chip to an external mechanism, on the debug interface based on the debug data.
    Type: Application
    Filed: July 28, 2011
    Publication date: January 31, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Frank Haverkamp, Heiko Michel, Joerg-Stephan Vogt
  • Publication number: 20130007517
    Abstract: Systems and methods may provide for conducting a recursive dependency analysis of an application file to identify a set of original libraries associated with the application file, and creating a set of interceptor libraries based on the set of original libraries. In addition, an execution environment may be prepared to support the execution of the interceptor libraries in conjunction with the execution of the original libraries, and the application file may be executed. Moreover, one or more execution characteristics of the interceptor libraries can be recorded and output via a utility interface.
    Type: Application
    Filed: June 30, 2011
    Publication date: January 3, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James P. Eberwein, Erik A. Kirk
  • Publication number: 20130007535
    Abstract: Embodiments of the present invention provide a method, system and computer program product for trace capture of successfully completed transactions for trace debugging of failed transactions. In an embodiment of the invention, a method for trace capture of successfully completed transactions for trace debugging of failed transactions is provided. The method includes storing entries in a log with information pertaining to successfully completed transactions in a transaction processing system executing in memory of a host server, detecting a failed transaction in the transaction processing system, generating a trace for the failed transaction, and providing with the generated trace an entry from the log with information pertaining to a successful completion of the failed transaction.
    Type: Application
    Filed: February 28, 2012
    Publication date: January 3, 2013
    Applicant: International Business Machines Corporation
    Inventor: Darren R. Beard
  • Publication number: 20120331354
    Abstract: A method of generating timestamped trace messages includes generating a trace message in response to an event at an instruction pipeline of a data processing device. If timestamping is enabled, timestamps are only included in the trace message only if a programmable condition is detected. For example, a timestamp can be included in the trace message if the amount of space used to store messages at a trace message buffer exceeds a watermark value. The condition that results in a timestamped trace message is programmable, and can be selected via a debug interface. Because timestamps are only included in trace messages when the programmable condition is satisfied, some trace messages will not include a timestamp, thereby reducing the amount of buffer space needed to store the trace messages.
    Type: Application
    Filed: September 5, 2012
    Publication date: December 27, 2012
    Applicant: FREESCALE SEMICONDUCTOR, INC.
    Inventors: Zheng Xu, Suraj Bhaskaran, Richard G. Collins, Jason T. Nearing
  • Publication number: 20120272102
    Abstract: A system and method for efficiently and easily capturing data dumps generated by a network device is disclosed. In one embodiment, a storage management device is disposed between a network device and a storage device. The network device is programmed with a virtual address that is associated with the storage management device. Upon generating a data dump, the network device writes the data dump to the virtual address where the storage management device receives the data dump and redirects it to a long-term storage location. Additionally, the storage management device can generate a record of each data dump that indicates the network device that generated the data dump and where the data dump was stored.
    Type: Application
    Filed: July 5, 2012
    Publication date: October 25, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Glen Tindal, Jeffery A. Schenk
  • Publication number: 20120260136
    Abstract: A method of detection of erroneous memory usage is provided. The method includes starting a computer and executing a program and a monitoring tool to collect calls to a memory during execution of the program, detecting a call to the memory using the monitoring tool, extracting lines of code which request access to a memory address via the call to the memory, detecting a set of variables to which access is granted via the call to the memory, extracting, after execution of the predetermined program, the set of variables for each of the lines of code, detecting erroneous memory usage by matching the extracted lines of code with the set of variables, and determining the call as erroneous upon access being granted to the memory corresponding to the set of variables during execution of the predetermined program when access is not possible during the execution of the program.
    Type: Application
    Filed: April 6, 2012
    Publication date: October 11, 2012
    Applicant: SAMSUNG ELECTRONICS CO. LTD.
    Inventors: Jae-Hoon JEONG, Ekaterina Anatolievna GORELKINA, Hyun-Joo AHN
  • Publication number: 20120254668
    Abstract: This document relates to apparatus and methods to store and retrieve trace information in on-chip system memory of microcontrollers. A microcontroller comprises a microprocessor and a memory device accessible through a data bus and an address bus coupled to the microprocessor. The microcontroller includes on-chip debug logic coupled to the microprocessor. Trace data can be retrieved from system memory using a debug port of the debug logic. A system in accordance with the present invention will lower the cost of implementation of trace features in microcontrollers, and strongly reduce the cost of supporting such features in debug tools.
    Type: Application
    Filed: June 19, 2012
    Publication date: October 4, 2012
    Applicant: ATMEL CORPORATION
    Inventors: Frode Milch Pedersen, Are Arseth
  • Publication number: 20120246518
    Abstract: Trace data is periodically written to a trace table. A software trap is run. If the software trap does not fire, a run marker is set to a predefined distance behind a position of an old run marker in the trace table. The trace data is periodically written to the trace table, and, if necessary, earlier written trace table data is overwritten. Most recently written trace data is detected to have reached the run marker and the software trap is run.
    Type: Application
    Filed: March 2, 2012
    Publication date: September 27, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anne P. Francis, David E. Knibb, Neil W. Leedham, Andrew Wright
  • Publication number: 20120216080
    Abstract: An electronic tracing process includes packing both stall (215) and reason (219) data into a single high priority timing information stream. An integrated circuit includes an electronic processor (110), and a tracing circuit (120) operable to pack both stall and events data into a single timing information stream. Other circuits, processes and systems are also disclosed.
    Type: Application
    Filed: February 14, 2012
    Publication date: August 23, 2012
    Applicant: Texas Instruments Incorporated
    Inventors: Kanika Ghai Bansal, Dipan Kumar Mandal, Gary A. Cooper, Bryan J. Thome
  • Publication number: 20120159268
    Abstract: A hosting provider operates a server system that provides a service to one or more tenants. The server system receives configuration data from the tenants. As part of providing the service to a given tenant, the server system attempts to access an external service due to the configuration data received from the given tenant identifying the external service. Service access errors can occur when attempting to access the external service. In response to determining that an error has occurred when attempting to access the external service, the server system sends a service access alert to a recipient associated with the given tenant. The service access alert notifies the recipient that the error has occurred.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Jonathan LeCroy, Wilson Li, Mayank Mehta, Ayse Yesim Koman, Victor William Habib Boctor, Mayerber Loureiro De Carvalho Neto, Christopher Barnes, Frank David Byrum
  • Publication number: 20120151275
    Abstract: A method of assessing a computer program under actual working conditions according to one embodiment comprises executing the computer program multiple times under actual working conditions, in response to each unhandled exception encountered during execution of the computer program, creating a corresponding stack frame signature to characterize the state of the program, and comparing the stack frame signatures to determine which unhandled exceptions are likely to have resulted from similar features.
    Type: Application
    Filed: February 24, 2012
    Publication date: June 14, 2012
    Applicant: CBS INTERACTIVE, INC.
    Inventors: Scott Clementson Elliott, Kenneth A. Gengler
  • Publication number: 20120151274
    Abstract: Systems, methods, and computer readable media for collecting run-time error information for an executing script through the use of a double code-injection technique are described. A first native code injection into a user's client-side application (e.g., a browser application) is made. The second injection is thereafter made by the user's client-side application itself (when the first injected program code is executed) into the application's associated scripting engine and only when a script error has been detected. The second injected program code or scripts collect detailed run-time script error information within the context of the application's scripting engine. The second injected program code can then return the collected error information to the user application's context where it may be provided to a debug tool or recorded for later review (by the first injected program code).
    Type: Application
    Filed: December 14, 2010
    Publication date: June 14, 2012
    Applicant: BMC SOFTWARE, INC.
    Inventors: Daniel Liberty, Moshe Kravchik
  • Publication number: 20120124429
    Abstract: An apparatus and method for tracing memory access information of a user program while ensuring a normal operation of the user program. An access permission about a memory region may be set to trace the memory access information. An instruction of the user program encounters a page fault according to the set access permission. If the page fault occurs, memory access information is stored based on the page fault, and apparatus executes an instruction causing the page fault while in a supervisor mode.
    Type: Application
    Filed: July 28, 2011
    Publication date: May 17, 2012
    Inventors: Hyun-Joo AHN, Jae-Hoon JEONG, Sung-Hwan HYUN
  • Publication number: 20120102366
    Abstract: A meta attribute useful for functional coverage is computed based on values comprised by two or more matching fields in a trace. The two or more matching fields may be comprised by a single entry of the trace or by a plurality of entries of the trace. A definition of the meta attribute may define which fields of the entries comprise values useful for computation of the meta attributes. The matching entries may be identified based on identifying values within the entries.
    Type: Application
    Filed: October 24, 2010
    Publication date: April 26, 2012
    Inventors: Yoram Simha Adler, Noam Behar, Dale E. Blue, Orna Raz-Pelleg
  • Publication number: 20120102370
    Abstract: A data processing device for memory dump collection, the data processing device includes: a processor to issue a first interrupt upon instructions to collect a memory dump being entered, to issue a second interrupt for running a program put in an address indicated by a reset vector upon the first interrupt being issued, and to record the memory dump in a storage unit in a process of running the program upon the second interrupt being issued.
    Type: Application
    Filed: April 26, 2011
    Publication date: April 26, 2012
    Applicant: FUJITSU LIMITED
    Inventors: Kazuhiro YOSHIDA, Masakazu Watanabe, Nobuhiro Tachino, Kenji Kaneshige
  • Publication number: 20120102365
    Abstract: A functional coverage model may be generated based on a trace. The functional coverage model may comprise values of attributes. The values may be extracted from one or more entries comprised by the trace. Based upon a selection of a field of an exemplary entry, content of the corresponding fields in other entries may be extracted and utilized. In some exemplary embodiments, names of attributes may be extracted from the trace. In some exemplary embodiments, a reference trace may be utilized as a comparative baseline coverage by generating a functional coverage model based upon the reference trace and comparing coverage of a second trace in respect to the functional coverage model with the coverage of the reference trace.
    Type: Application
    Filed: October 24, 2010
    Publication date: April 26, 2012
    Inventors: Yoram Simha Adler, Behar Noam, Dale E. Blue, Orna Raz-Pelleg
  • Publication number: 20120089876
    Abstract: In existing mobile networks, users may be traced to troubleshoot problematic user connections, monitor generic network performance, and to perform root cause analysis to identify network problems. However, the existing tracing methods provide incomplete trace information. To address this and other issues, early tracing recording is enabled in which an involved trace entity starts recording the trace data when any initial activity related to the user equipment is detected. The trace entity can continue the trace if a trace trigger is later confirmed or may discard the trace data if the trigger is not confirmed.
    Type: Application
    Filed: October 6, 2010
    Publication date: April 12, 2012
    Inventors: András Rácz, Tamás Borsos, László Kovács
  • Publication number: 20120084606
    Abstract: A device management apparatus acquires the state of a device (image forming apparatus), and determines whether or not an error occurring in the image forming apparatus is the already-occurred error based on the change in the state of the image forming apparatus. When the error occurring in the image forming apparatus is an already-occurred error, the device management apparatus determines whether or not the error continues for a period of time equal to or longer than a predetermined period of time. When the error continues for a period of time equal to or longer than a predetermined period of time, the device management apparatus changes an error notification destination, and retransmits an electronic mail regarding the error to the changed notification destination.
    Type: Application
    Filed: September 14, 2011
    Publication date: April 5, 2012
    Applicant: CANON KABUSHIKI KAISHA
    Inventor: TOSHIAKI IGARASHI
  • Publication number: 20120066547
    Abstract: A method for problem determination and resolution in an information technology (IT) system includes receiving a problem ticket, searching a database for a plurality of problem features based on data included in the problem ticket, extracting the plurality of problem features from the database, and generating a problem signature corresponding to the problem ticket, wherein the problem signature comprises at least one non-textual feature extracted from the plurality of problem features.
    Type: Application
    Filed: September 13, 2010
    Publication date: March 15, 2012
    Applicant: International Business Machines Corporation
    Inventors: Allen M. Gilbert, Laura Zaihua Luan, Daniela Rosu, Christopher Ward
  • Publication number: 20120036397
    Abstract: A log event can be received from a log source within an application server environment. The log event can be an error message which is associated with a log level. In one embodiment, the application server environment can be a JAVA 2 ENTERPRISE EDITION runtime environment. The log event can be analyzed to determine the ontology of the log event which can comprise of the log event, the user context, and the relationship of the log event to the user context. The log event can be associated with the user context as determined by the relationship of the log event.
    Type: Application
    Filed: August 4, 2010
    Publication date: February 9, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: NAVEEN G. BALANI, RAMKISHOR SINGH