摘要:
A number of improvements in network adapters that offload protocol processing from the host processor are provided. Specifically, mechanisms for handling memory management and optimization within a system utilizing an offload network adapter are provided. The memory management mechanism permits both buffered sending and receiving of data as well as zero-copy sending and receiving of data. In addition, the memory management mechanism permits grouping of DMA buffers that can be shared among specified connections based on any number of attributes. The memory management mechanism further permits partial send and receive buffer operation, delaying of DMA requests so that they may be communicated to the host system in bulk, and expedited transfer of data to the host system.
摘要:
A method, apparatus, and computer instructions for transferring data objects. A request for a data object is received at a communication adapter. A determination is made as to whether the data object is stored in a memory in the communication adapter in response to receiving the request. The data object is transferred from the memory to a receiver of the data object through the communication adapter in which transfer of the data across a bus connecting the communication adapter to the data processing system is unnecessary in response to the data object being present in the memory.
摘要:
A method for group communication over a network of processors comprises determining an overlay spanning tree comprising an origin node and at least one receiving node, and controlling a source communication rate to be less than or equal to a bottleneck rate of the overlay spanning tree.
摘要:
Access is obtained to a plurality of intermediately transformed electronic documents (with a plurality of sections and subsections) which have been transformed, by topical analysis and text summarization techniques, from a plurality of original electronic documents comprising at least some unstructured electronic documents. Audit and retrieval agent code is appended to the sections and subsections to create a plurality of finally transformed electronic documents. Users are allowed to access the finally transformed electronic documents. The users are provided with accountability reminders contemporaneous with the access. The access of the users to the sections and subsections of the finally transformed electronic documents is logged. An audit report is provided based on the logging. Also provided is a cloud service for enterprise-level sensitive data protection with variable data granularity, using one or more one guest virtual machine images.
摘要:
A system and computer program product for enabling monitoring across one or more domains include identifying information technology resources across one or more domains, collecting information technology dependency information relating to the information technology resources identified across one or more domains, collecting monitoring data from the information technology resources identified across one or more domains, and using the dependency information to aggregate the monitoring data into one or more pre-determined metrics.
摘要:
In an illustrative embodiment, a computing system comprises a first computer coupled to one or more additional computers. Each of the one or more additional computers manages a respective set of one or more virtualized computing resources. The first computer manages the one or more additional computers.
摘要:
A semiconductor device includes a first layer, first and second active areas disposed on the first layer; a trench disposed between the first and second active areas, an insulating oxide that fills the trench to a level below a surface of the first and second active layers, and a nitride cap disposed on top of the insulating oxide so that the first and second active areas can be cleaned without damaging the insulating oxide. A top surface of the nitride cap in regions adjacent to the first and second active areas in aligned with a top surface of the first and second active areas, a top surface of the nitride cap in a center region of the nitride cap is stepped below the top surface of the adjacent regions, and a void is formed between the top surface regions adjacent to the first and second active areas.
摘要:
A method, computer program product, and system for managing tasks for a virtual machine are presented. An amount of resources to perform a task for the virtual machine are identified in response to receiving a request to perform the task for the virtual machine in a set of data processing systems. A set of resources in the set of data processing systems available to complete the task for the virtual machine are identified. A set of priorities for a set of phases of the task are identified. Operations are scheduled on the set of resources to perform the task for the virtual machine based on the set of priorities identified for the set of phases of the task.
摘要:
A computer implemented method, a computer program product and a data processing system allocate resources within a computing organization. A hypervisor layer is implemented on an underlying hardware. The hypervisor layer comprises a set of virtual machines. A first pseudo-hypervisor layer is then implemented within a first one of the set of virtual machines of the hypervisor layer. The first pseudo-hypervisor layer comprises a second set of virtual machines. A first software component is located within a first virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer. A second software component is collocated within a second virtual machine of the second set of virtual machines of the first pseudo-hypervisor layer.
摘要:
A system for transferring a live application from a source to a target machines includes memory capture component that monitors and captures memory segments associated with one or more memories, one or more sets of these memory segments comprising one or more applications, the memory segments changing while the live application is in execution. A frequency ranking component organizes the memory segments in an order determined by memory segment change frequency. A link identification component identifies one or more connecting links to one or more sets of peer machines, each set of machines connecting said source machine to said target machine, the link identifier further determining the bandwidth associated with each connecting link. A routing component preferentially routes one or more of the memory segments over said connecting links based on said order.