Abstract:
A system and method is provided for reducing memory leaks in virtual machine programs, such as those encountered in programs running in the Java Virtual Machine (JVM) environment. A compiler, such as a Java Just-In-Time (JIT) compiler, is used to identify the last use of an variable and, subsequent to the program statement where the last use occurs, insert a nullification statement. The nullification statement nullifies the variable so that it no longer references an object stored in a garbage collected heap. Variables in a program are identified in the activation records of the program. The nullification statement, when executed, severs the link between the program and the objects stored in the garbage-collected heap so that the program is no longer seen as a “root” for the object, often enabling the garbage collector to reclaim memory occupied by the object sooner.
Abstract:
A system and method for cache optimized data formatting is presented. A processor generates images by calculating a plurality of image point values using height data, color data, and normal data. Normal data is computed for a particular image point using pixel data adjacent to the image point. The computed normalized data, along with corresponding height data and color data, are included in a limited space data stream and sent to a processor to generate an image. The normalized data may be computed using adjacent pixel data at any time prior to inserting the normalized data in the limited space data stream.
Abstract:
A system and method for sensing the formation of tin whiskers is presented. An assembly substrate includes whisker detectors at various locations for detecting tin whiskers in an X direction, a Y direction, and a Z direction relative to the assembly substrate. Each whisker detector includes sense traces and a trace bridge that produce “planar gaps” and “orthogonal gaps” that are smaller than trace gaps produced by other traces on the assembly substrate. As such, tin whiskers short across the planar gaps and orthogonal gaps before they short across trace gaps. When the assembly substrate is finished with processing steps, a system tester performs a continuity test on the whisker detectors. When the continuity test fails, an operator is notified to check for tin whiskers on the assembly substrate. Once shipped, a processor monitors the whisker detectors for shorts throughout the product's lifecycle.
Abstract:
A system and method for processing data through a network firewall is presented. A more secure computer system initiates connections to one or more less secure computer systems. The more secure computer system and less secure computer system are separated by a firewall. The more secure computer system queries each less secure computer system periodically to see if there is event data or requests that the more secure computer system should respond to. The less secure computer systems store event data and requests from clients in a storage location until queried by the more secure computer system. When queried, the less secure computer system sends the event data or request information to the more secure computer system through the firewall. The more secure computer system either sends a response to the less secure computer system or sends the event data to an event console for a system administrator to analyze.
Abstract:
A system and method is provided to perform a routine when the user attempts to access any document in a database. When the user attempts to access any document in the database, a call to a function is performed to determine whether the user is allowed to access a local copy of the database. The function determines whether the database is a local database. If the function determines that the database is running on the user's local machine then the function determines whether the user has permission to access the local copy of the database by searching through individual and group access control files. If the user is authorized, the function allows the user to access the local copy of the database. However, if the user is not authorized, an error message is displayed and the user is denied access to the local database copy.
Abstract:
An approach is provided that receives event data that correspond to detected activities performed by a user on one of a set of one or more computer systems. The detected activities are performed by the user over a time duration. The approach analyzes the event data using time-based models. Each of the time-based models correspond to a different time interval that is included in the time duration. The analysis results in time-based risk scores pertaining to the user for each of the different time intervals. An action is then performed based on an overall security risk score of the user with the overall security risk score of the user being calculated based on the different time-based risk scores.
Abstract:
An approach is disclosed that selects a current processing element from a set of processing elements included in a software pipeline. A selected input data to the current processing element was an output data from a previously executed processing element. The input data is verified by computing a current fingerprint of the selected input data and comparing the computed fingerprint to an expected fingerprint. The expected fingerprint was previously computed after the output data was generated by the previously executed processing element. In response to the comparing revealing that the current fingerprint fails to match the expected fingerprint, a verification error is indicated to a user of the process.
Abstract:
An approach is provided in which the approach builds a combination model that includes a normal status model and an abnormal status model. The normal status model is built from a set of time-sequenced normal status records and the abnormal status model is built from a set of time-sequenced abnormal status records. The approach computes a set of time-sequenced coefficient combination values of the normal status model and the abnormal status model based on applying a set of fitting coefficient characteristics to the normal status model and the abnormal status model. The approach performs goal seek analysis on a system using the combination model and the set of time-sequenced coefficient combination values.
Abstract:
An approach is provided in which the approach calculates at least one weighting factor based on a word frequency analysis of an unlabeled document against a set of word frequencies corresponding to a set of labeled documents. The approach computes an a posteriori classification probability of the unlabeled document based on the at least one weighting factor, and creates an inferred classifier based on the a posteriori classification probability. The approach classifies the unlabeled classifier using the inferred classifier.
Abstract:
An approach is provided in which the approach captures an image of a component rack that includes a set of hardware components that are part of a hyperconverged system. The approach discovers the set of hardware components on a computer network during a domain-specific discovery process, and verifies that each one of the set of hardware components captured in the image matches one of the discovered set of hardware components. The approach monitors a status of the set of hardware components in response to verifying that each one of the set of hardware components captured in the image matches one of the discovered set of hardware components.