Abstract:
An approach is provided to adjust a camera shutter lag. In the approach, data is collected that corresponds to an ambient light found in a physical environment with the ambient light being controlled using a pulse-width modulation (PWM). The pulse-width modulation corresponds to a PWM timing model. When an exposure request is received, the camera shutter lag is calculated using the PWM timing model. The calculated shutter lag is based on a future point in time at which the ambient light of the physical environment is predicted to be at a selected light output level, such as a power level selected by the user of a camera. When the calculated camera shutter lag has expired, a shutter of the camera is opened causing a camera lens to be exposed that results in a captured exposure.
Abstract:
A processor receives an instruction operation (OP) code from a verification system. The instruction OP code includes instruction bits and forced event bits. The processor identifies a forced event based upon the forced event bits, which is unrelated to an instruction that corresponds to the instruction bits. In turn, the processor executes the forced event.
Abstract:
An approach is provided in which a virtual function, which executes on a network adapter, receives a data packet from a first virtual machine. A translation entry is identified that corresponds to sending the data packet from the first virtual machine to a second virtual machine, and a determination is made as to whether an onboard memory partition assigned to the virtual function includes the identified translation. If the onboard memory location includes the translation entry, the data packet is sent to the destination virtual machine using the translation entry retrieved from the onboard memory partition. Otherwise, if the translation entry is not located in the onboard memory partition, the data packet is sent to the destination virtual machine using a translation entry retrieved from an off board memory location.
Abstract:
An approach is provided in which a network hardware adapter stores offload information in a shared memory area that is located on a host system. The offload information includes connection information that was offloaded to the network hardware adapter by an application executing on the host system. An operating system (e.g., a network device driver) detects a network adapter error corresponding to the network hardware adapter and, in turn, retrieves the offload information stored in the shared memory area. As such, an analysis application utilizes the retrieved offload information to debug the network adapter error.
Abstract:
An approach is provided in which a formal verification tool sends a condition signal to a first circuit instance and to a second circuit instance, which are both instances of an electric circuit design. The formal verification tool selects a common input port and sends a first input value to the common input port of the first circuit instance and sends a second input value, which is different than the first input value, to the common input port of the second circuit instance. In turn, the first circuit instance generates a first output value and the second circuit instance generates a second instance value, which are utilized to verify dependencies between the electronic circuit's input ports and output ports.
Abstract:
A method and system for fault management in virtual computing environments are provided. The system includes: a monitor of fault events from virtual machines and host devices in a virtual computing environment and a monitor of situation events in the virtual computing environment wherein the situation events refer to a virtual machine name and a host device name. A universal faults component determines if a fault event affects both virtual machines and host devices and a correlating component correlates fault events relating to virtual machines and host devices as relating to the same problem. Host machine fault events correlated to a problem are marked as a root event and virtual machine fault events correlated to a problem are marked as symptoms with a link to the root event.
Abstract:
An approach is provided that receives an alteration request to mark a selected column in a database table as an unused column. A database control table is then updated to indicate that the selected column is unused. After the database control table is updated, when a read request is received for the selected column, the same data is returned for the selected column for each row being read and this data is not stored in the database table.
Abstract:
An approach is provided to establish, over a network adapter, network sessions with various client computer systems. Requests for a webpage are received at the network adapter from the client computer systems. The requested webpage is retrieved from a storage area. Multiple timeout intervals are initialized and stored in a memory area, wherein each of the plurality timeout intervals corresponds to one of the client computer systems. The timeout intervals that are initialized are different for at least some of the client computer systems. The requested webpage is returned to the client computer systems. When a timeout interval elapses for any of the client computer systems, the system terminates the session that was established with the client computer system.
Abstract:
A hypervisor receives an interrupt that includes a target address and, in turn, branches to an administrating interrupt vector. Next, the administrating interrupt vector determines whether to branch to a piggyback interrupt handler corresponding to a piggyback interrupt vector. Based upon the determination, the hypervisor either branches to the piggyback interrupt handler or to an administrating interrupt handler that corresponds to the administrating interrupt vector.
Abstract:
An approach is provided that uses policies to determine which parental privileges are inherited by the parent's child processes. A parent software process initializes a child software process, such as by executing the child process. The parent process is associated with a first set of privileges. The inheritance policies are retrieved that correspond to the parent process. A second set of privileges is identified based on the retrieved inheritance policies, and this second set of privileges is applied to the child software process.