Abstract:
An apparatus and a method for sending a message from an enterprise service bus (ESB) is described. A message is formed at an enterprise service bus (ESB) of a computer system. The message is transmitted from the ESB to different ESBs through a User Datagram Protocol (UDP) multicast.
Abstract:
Methods, systems, and computer program for implementing a private cloud are provided. A computer-implemented method may include registering a private cloud in a central registry; retrieving private cloud registration data from the central registry; sharing the private cloud registration data with other users; and allowing other users to connect to the private cloud using the shared private cloud registration data.
Abstract:
This application relates to receiving, by a processing device executing a virtual machine, bytecode including an object to be loaded into a memory space, the object being tagged with a garbage collection descriptor. The garbage collection descriptor is generated according to an annotation to the object in a source code. The application further provides for determining, in view of the garbage collection descriptor, a region of the memory space to store the object, in which the memory space includes a first region to store a first set of objects that have survived less than a determined number of rounds of garbage collection and a second region to store a second set of objects that have survived at least the determined number of rounds of garbage collection in the first region. The application further provides for storing the object in the region of the memory space and adding the object to one of the first objects or the second set of objects in view of the region.
Abstract:
Systems and methods for controlling access to a private partition on a storage device are disclosed for. An example system includes a token reader that detects a hardware token storing a private key and obtains the private key stored on the hardware token. The system also includes a partition controller that determines whether the private key unlocks a private partition on a storage device. In response to determining that the private key unlocks the private partition, the partition controller unlocks the private partition on the storage device. The private partition is invisible to an operating system executing in the computer system when the private partition is locked.
Abstract:
Mechanisms for transferring data from a source computing device to a target computing device are provided. A filename identifier (ID) that identifies a file stored on the source computing device is presented on a display device. A selection of the filename ID is received. A unique identifier is generated, and association data that associates the unique identifier with the file is generated. The unique identifier is encoded into a coded image. The coded image is presented on the display device. A first file transfer request is received via a communications interface from a target computing device to transfer the file via the communications interface to the target computing device. The first file transfer request includes an identifier. Responsive to receiving the first file transfer request, the file is sent to the target computing device.
Abstract:
A debugger executes on a computer system to receive a first debugging command from a client, where the first debugging command sets a first instruction in the reactive application to suspend execution of the reactive application, and where during execution of the reactive application the first instruction is triggered which suspends execution of the reactive application. Responsive to the execution of the reactive application being suspended, a system clock of the reactive application is replaced with a substitute clock and the substitute clock is paused. The debugger then receives a second debugging command, where the second debugging command triggers a second instruction in the reactive application to continue execution of the reactive application. Responsive to the execution of the reactive application being continued, clocking of the substitute clock is continued.
Abstract:
A debugger executes on a computer system to receive a first debugging command from a client, where the first debugging command sets a first instruction in the reactive application to suspend execution of the reactive application, and where during execution of the reactive application the first instruction is triggered which suspends execution of the reactive application. Responsive to the execution of the reactive application being suspended, a system clock of the reactive application is replaced with a substitute clock and the substitute clock is paused. The debugger then receives a second debugging command, where the second debugging command triggers a second instruction in the reactive application to continue execution of the reactive application. Responsive to the execution of the reactive application being continued, clocking of the substitute clock is continued.
Abstract:
Systems, methods, and techniques of distributing a workload of an application to a GPU are provided. An example method includes obtaining an intermediate representation of a source code portion of an application and compiling the intermediate representation into a set of instructions that is native to the GPU. The set of instructions includes a binary representation of the source code portion executable on the GPU, and execution of the set of instructions on the GPU includes processing a workload of the application. The method also includes transforming data associated with the source code portion into one or more data types native to the GPU and sending to the GPU a communication including the set of instructions executable on the GPU and the one or more data types native to the GPU.
Abstract:
A method and system for automatic ESB deployment at the level of individual services is described. In one method, a load balancer repeatedly monitors performance of individual services installed on ESB nodes. The performance is measured in view of utilization metrics of the individual services. The load balancer periodically determines whether the performance of one or more of the individual services falls below a performance threshold and deploys duplicate services for the one or more of the individual services that falls below the performance threshold at one or more additional ESB nodes without user intervention in response to the periodically determining.
Abstract:
A device includes a processor and a memory comprising machine readable instructions that when executed by the processor, cause the system to display information to a user through a display screen of the device, the display screen being positioned on a front side of the device, receive a first input from a first sensor placed on a left side of the device, the first input indicating a placement of at least one appendage along the first sensor, receive a second input from a second sensor placed on a right side of the device, the second input indicating a placement of at least one appendage along the second sensor, and execute a predefined function within an application running on the device, the predefined function being based on both the first input and the second input.