Abstract:
A system and method of collaborative processing of service requests includes receiving a service request at an application server, beginning execution of a proxy member function of a proxy class, and determining whether a movable member function in a movable class is to be executed at a client. When the movable member function is to be executed at the client, the method further includes creating a partial response including code for the movable class and information for invoking the movable member function and transmitting the partial response to the client fore execution of the movable member function. When the movable member function is not to be executed at the client, the method further includes executing the movable member function in the application server and returning a result of the movable member function as a result of the proxy member function. The proxy member function replaces the movable member function.
Abstract:
Systems and methods are provided for data federation query suggestion. An example system includes a query constraint database including at least one query constraint and a query constraint resolving module that receives from a user a query to search a federated database using a federated database search engine and determines if the query satisfies at least one query constraints. The system further includes a query suggestion module that determines a query suggestion if the query does not satisfy at least one query constraints.
Abstract:
Systems and methods are disclosed for processing messages using a dynamic messaging bus. An example system includes a plurality of services residing in a dynamic messaging bus including a plurality of sub-buses. Each service is assigned to a sub-bus of the plurality of sub-buses. The example system also includes a performance monitoring module that monitors a performance of one or more services executing on a sub-bus to which the respective one or more services is assigned. A first service is assigned to a first sub-bus and a second service is assigned to a second sub-bus. The example system further includes a swapping module that determines, based on the monitored performances of the first and second services, whether to swap the assignments of the first and second services such that the first service is assigned to the second sub-bus and the second service is assigned to the first sub-bus.
Abstract:
A system and method of managing immutable objects includes monitoring new object construction, detecting construction of an object, determining a key for the object, looking the key up in a persistent storage system, when the key is found in the persistent storage system, loading the object from the persistent storage system, and when the key is not found in the persistent storage system constructing the object, determining whether the object is immutable, and storing the object in the persistent storage system when the object is immutable. In some examples, determining whether the object is immutable includes examining each primitive type data member of the object, examining each reference type constructor parameter of the object to determine whether the reference type constructor parameter is defensively copied, examining all function calls used by the object to determine whether the function calls preserve immutability, and recursively examining each reference type data member of the object.
Abstract:
A system and method of cluster debugging includes detecting debug events occurring in one or more first virtual machines, storing debug records, each of the debug records including information associated with a respective debug event selected from the debug events and a timestamp associated with the respective debug event, merging the debug records based on information associated with each timestamp, starting one or more second virtual machines, each of the one or more second virtual machines emulating a selected one of the one or more first virtual machines, synchronizing the one or more second virtual machines, retrieving the merged debug records, and playing the merged debug records back in chronological order on the one or more second virtual machines. In some examples, the method further includes collecting clock synchronization records. In some examples, merging the debug records includes altering an order of one or more of the debug records based on the clock synchronization records.
Abstract:
Systems and methods for just-in-time (JIT) code compilation by a computer system. An example method may comprise identifying a defined pattern in a byte stream, evaluating a conditional expression associated with the pattern, and compiling the byte stream into a native code, while excluding, in view of the evaluating, a portion of byte stream associated with the pattern.
Abstract:
A method includes consulting a database that includes a first entry indicating amounts of time that a first service provider machine takes to perform individual actions of the plurality of actions and a second entry indicating amounts of time that a second service provider machine takes to perform individual actions of the plurality of actions; generating a first estimate for the amount of time the first service provider machine is expected to take in processing the requested service, wherein generating the first estimate includes summing times associated with the plurality of actions from the first entry; and generating a second estimate for the amount of time the second service provider machine is expected to take in processing the requested service, wherein generating the second estimate includes summing times associated with the plurality of actions from the second entry.
Abstract:
An example method of controlling access to data stored in a plurality of autonomous data sources includes receiving a federated query including a plurality of source queries. The method also includes receiving a request to submit a source query to a target data source. The method further includes determining whether the request matches at least one rule stored in a rules database. A rule that includes a given query matches a request that includes the given query. The method also includes when it is determined that the request does not match a rule stored in the rules database, sending a communication to cause (i) the source query to be submitted to the data source, and (ii) an initial result of the source query to be masked. The initial result of the source query has the same structure as the masked result of the source query.
Abstract:
A mechanism for providing context simulation. A method includes receiving context relay from a client machine. The context relay includes context input set (CIS) and configuration difference (diff) data. The method also includes applying the diff data to an application so that configuration settings of the application are same as the configuration settings of a first application on the client machine. The method also includes retrieving message information from the CIS and sending the message information to the application. The method further includes executing the application in same interval as the first application being executed on the client machine.
Abstract:
Various examples are directed to systems and methods for managing a database organized according to a schema. The database may comprise a database file corresponding to a table described by the schema. The database file may comprise a first row entry corresponding to a first row of the table. The first row entry may comprise at least one data item. A command may be received. The command may modify a first data item in the first row of the table. An indication of the modified value for the first data item may be written to a change location at the first file. The first entry may be modified to include a pointer to the indication of the modified value for the first data item.