Abstract:
A system, and computer program product for cloud optimization using workload analysis are provided in the illustrative embodiments. An architecture of a workload received for execution in a cloud computing environment is identified. The cloud computing environment includes a set of cloud computing resources. A section of the workload is identified and marked for static analysis. Static analysis is performed on the section to determine a characteristic of the workload. A subset of the set of cloud computing resources is selected such that a cloud computing resource in the subset is available for allocating to the workload and has a characteristic that matches the characteristic of the workload as determined from the static analysis. The subset of cloud computing resources is suggested to a job scheduler for scheduling the workload for execution.
Abstract:
A method for dynamic optimization of thread assignments for application workloads in an simultaneous multi-threading (SMT) computing environment includes monitoring and periodically recording an operational status of different processor cores each supporting a number of threads of the thread pool of the SMT computing environment and also operational characteristics of different workloads of a computing application executing in the SMT computing environment. The method further can include identifying by way of the recorded operational characteristics a particular one of the workloads demonstrating a threshold level of activity. Finally, the method can include matching a recorded operational characteristic of the particular one of the workloads to a recorded status of a processor core best able amongst the different processor cores to host execution in one or more threads of the particular one of the workloads and directing the matched processor core to host execution of the particular one of the workloads.
Abstract:
One embodiment of the present invention sets forth a technique for recommending digital content to a user of a digital content application based on continually learned patterns of behavior. Based on metrics collected from a current session of the digital content application, properties associated with one or more users interacting with the application are inferred. The inferred properties are matched against previously defined patterns of behavior to identify digital content that could be presented to the one or more users for optional selection.
Abstract:
Embodiments of the present invention provide graphic processing techniques and configurations including an apparatus comprising a storage medium having stored therein a table comprising information about respective positions and sizes of a number of rectangular blocks, the rectangular blocks to substantially form at least one plane having an arbitrary shape object, and at least one overlay engine operatively coupled with the table and associated with the at least one plane to request the information about the respective positions and the sizes of the number of rectangular blocks to provide graphics overlay of the arbitrary shape object. Other embodiments may be described and/or claimed.
Abstract:
A query is received from a particular endpoint device identifying a particular wireless access point encountered by the particular endpoint device. Pre-existing risk assessment data is identified for the identified particular wireless access point and query result data is sent to the particular endpoint device characterizing pre-assessed risk associated with the particular wireless access point. In some instances, the query result data is generated based on the pre-existing risk assessment data. In some instances, pre-existing risk assessment data can be the result of an earlier risk assessment carried-out at least in part by an endpoint device interfacing with and testing the particular wireless access point.
Abstract:
A system, method, and computer program product are provided for securing data on a server based on a heuristic analysis. In use, information associated with attempts to access data on a server is recorded. Additionally, the information is heuristically analyzed. Further, the data is secured on the server based on the heuristic analysis.
Abstract:
According to one general aspect, a method of remotely controlling a remote computing device from a local computing device that is executing a web browser, may include receiving, via a Hypertext Transfer Protocol (HTTP), at least a graphical human interface output from the remote computing device. The method may also include displaying, within a display area defined by a Hypertext Markup Language (HTML) web element, wherein the HTML web element is interpreted by the web browser, the graphical human interface output from the remote computing device. The method may further include receiving, from the remote computing device via HTTP, at least one update to the graphical human interface output. And, the method may include dynamically updating the graphical human interface output displayed within the display area defined by the HTML web element, wherein updating is based upon the received at least one update to the graphical human interface output.
Abstract:
A method in one example implementation includes providing a memory component with one or more alternative email entries associated with a plurality of name records. The name records represent one or more authorized users of a network. The method further includes determining whether any of the one or more alternative email entries corresponds to a sender email address in an incoming email message, where the incoming email message is being sent from the sender email address to at least one official email address associated with the network. In more specific embodiments the method includes tagging the incoming email message with a first or second flag depending on whether any of the one or more alternative email entries corresponds to the sender email address and whether a username of the sender email address includes an identifiable portion of one of the plurality of name records.
Abstract:
Methods and systems enabling a cloud service to manage robotic devices are provided. An example method includes receiving a task order including information that identifies configuration requirements for a robotic device to perform a task, program instructions executable by the robotic device to perform the task, and payment information for the task. The method may also include selecting one or more robotic devices to perform the task from among a pool of robotic devices. For instance, the selected one or more robotic devices may be leased for a period of time to perform the task. The method may further include providing the configuration requirements and the program instructions to the selected one or more robotic devices, and receiving confirmation that the task has been performed. According to the method, payment may be provided to one or more accounts registered with the selected one or more robotic devices.
Abstract:
Methods, software suites, and systems of generating a recovery snapshot and creating a virtual view of the recovery snapshot are disclosed. In an embodiment, a method includes generating a recovery snapshot at a predetermined interval to retain an ability to position forward and backward when a delayed roll back algorithm is applied and creating a virtual view of the recovery snapshot using an algorithm tied to an original data, a change log data, and a consistency data related to an event. The method may include redirecting an access request to the original data based on a meta-data information provided in the virtual view. The method may further include substantially retaining a timestamp data, a location of a change, and a time offset of the change as compared with the original data.