Abstract:
Disclosed is a computerized method, non-transitory machine-readable medium and computer system for ensuring that critical information, such as that allowing an ecommerce customer to activate purchased downloadable software, can be retrieved even if issues occur in the primary distribution center. The method receives a call for data (e.g. key) at a first endpoint associated with a first distribution center, determining that the call for the data cannot be fulfilled at the first endpoint, and shifting the call for the data to a second endpoint associated with a second distribution center. The computer system comprises a first and second distribution center system, including modules for: fulfilling a call for data, or key; determining if a call cannot be fulfilled, determining a plurality of error indications; and redirecting calls originally directed to one of a first computer or a second computer to the other of the first computer and the second computer.
Abstract:
A portable and mobile deployable data center (DDC) is disclosed, which includes various components that enables the DDC to have multiple functions including, computing, data storage and retrieval, communications and routing. A DDC includes a rugged case that suitable for harsh environments, an interconnection mechanism, a plurality of hot swappable readers, a plurality of hot swappable portable computing devices, and a plurality of hot swappable power supplies.
Abstract:
Systems and methods are disclosed for providing a secondary website with content mirrored from a primary website. One method includes accessing a generated primary website provided by one or more primary servers; generating a secondary website based on the generated primary website; storing the secondary website on a secondary server; and providing the secondary website from the secondary server when primary website is unavailable.
Abstract:
Disclosed is a computerized method, non-transitory machine-readable medium and computer system for ensuring that critical information, such as that allowing an ecommerce customer to activate purchased downloadable software, can be retrieved even if issues occur in the primary distribution center. The method receives a call for data (e.g. key) at a first endpoint associated with a first distribution center, determining that the call for the data cannot be fulfilled at the first endpoint, and shifting the call for the data to a second endpoint associated with a second distribution center. The computer system comprises a first and second distribution center system, including modules for: fulfilling a call for data, or key; determining if a call cannot be fulfilled, determining a plurality of error indications; and redirecting calls originally directed to one of a first computer or a second computer to the other of the first computer and the second computer.
Abstract:
A standby system device 200 which is connected to an active system device 100 includes a process information sharing unit 203B and a standby process management unit 203C. The process information sharing unit 203B receives active side process information indicating usage of resources of an active system process 103A operating on the active system device 100 from the active system device 100. The standby process management unit 203C terminates a standby process 203A before activating a takeover process 203D used for taking over processing of the active system process 103A when a takeover of the active system process is requested on the standby system device 200, the standby process 203A referring to the active side process information and acquiring resources in such a way that usage of resources of the standby process 203A is equal to or greater than the usage of resources of the active system process 103A.
Abstract:
An Availability Management Framework (AMF) configuration is generated, in which service units of a service group are allocated to node groups and the node groups are allocated to physical nodes. Each service unit is a unit of redundancy for services provided and protected by the service group. Each node group includes a group of virtual machines. Each node group is mapped to a different host group that includes one or more physical nodes. Collocation and separation rules are generated for the virtual machines to specify which virtual machines are collocated in a same node group and which virtual machines are separated by different node groups. Each service unit of the service group is mapped to a different node group to guarantee hardware separation in the AMF configuration for different service units of the service group and for the virtual machines allocated to the different service units.
Abstract:
Methods, systems, and articles of manufacture for injecting faults at select execution points of distributed applications are provided herein. A method includes monitoring a run-time state of each of multiple components of a distributed application to determine one or more sequence of events that triggers a fault injection point at one of the multiple components; defining a fault injection scenario in a specification based on said monitoring, wherein said fault injection scenario comprises a description of one or more sequence of events during which an intended fault is to be injected to a target component of the multiple components at one selected event; and executing the fault injection defined in the specification to perform injection of the intended fault during run-time of the distributed application.
Abstract:
Disclosed here is a fault tolerant architecture suitable for use with any distributed computing system. A fault tolerant architecture may include any suitable number of supervisors, dependency managers, node managers, and other modules distributed across any suitable number of nodes. In one or more embodiments, supervisors may monitor the system using any suitable number of heartbeats from any suitable number of node managers and other modules. In one or more embodiments, supervisors may automatically recover failed modules in a distributed system by moving the modules and their dependencies to other nodes in the system. In one or more embodiments, supervisors may request a configuration package from one or more dependency managers installing one or more modules on a node. In one or more embodiments, one or more modules may have any suitable number of redundant copies in the system, where redundant copies of modules in the system may be stored in separate nodes.
Abstract:
A cluster monitor (10) controls activation of a business application program and a monitoring agent in a cluster system (300) that includes a plurality of servers. The cluster monitor (10) includes a business server identifying unit (21) that identifies a server on which the business application program is operating among the servers, and an agent server selecting unit (22) that selects a server for activating the monitoring agent from among the servers based on the identified server.
Abstract:
Methods and systems for a complete vehicle ecosystem are provided. Specifically, systems that when taken alone, or together, provide an individual or group of individuals with an intuitive and comfortable vehicular environment. The present disclosure builds on integrating existing technology with new devices, methods, and systems to provide a complete vehicle ecosystem.