Abstract:
Systems and methods for determining whether networked system migrations are successful are disclosed. In accordance with one method, a first set of properties of the networked system on a source platform in a first administrative domain is determined. Further, the method includes transferring the networked system to a destination platform in a second administrative domain. In addition, a second set of properties of the transferred system on the destination platform is determined, where the first and second sets of properties include functional properties and at least one of: performance properties, security properties or reliability properties. The method also includes outputting an indication that the transfer of the system to the destination platform is successful in response to determining that one or more of the properties of the second set are equivalent to corresponding properties of the first set.
Abstract:
An all-optical transmission system includes an optical switch matrix, a plurality of optical components communicating over the optical switch matrix, and a top of rack (ToR) switch coupled to each optical component. Each ToR switch communicates with the optical components and with other ToR switches. The optical component includes a send circuit and a receive circuit with the send circuit having a ToR transceiver to receive data, a multiplexer coupled to the ToR transceiver, a Wavelength Selective Switch (WSS) coupled to the multiplexer, and a circulator coupled to the WSS.
Abstract:
Described is an improved method, system, and computer program product for preventing concurrent access and processing of data by multiple threads. The inventive approach may be applied to prevent concurrent access in resequencers.
Abstract:
A method and system for predicting the performance of a multi-tier computer software system operating on a distributed computer system, sends client requests to one or more tiers of software components of the multi-tier computer software system in a time selective manner; collects traffic traces among all the one or more tiers of the software components of the multi-tier computer software system; collects CPU time at the software components of the multi-tier computer software system; infers performance data of the multi-tier computer software system from the collected traffic traces; and determines disk input/output waiting time from the inferred performance data.
Abstract:
Described is an improved method, system, and computer program product for implementing an improved resequencer, along with related mechanisms and processes. Some embodiments provide an approach for generating a message sequence having start and increment values.
Abstract:
In one embodiment, an optimization hint may be included in a business process flow. An executable process may be generated from the business process flow where the optimization hint is included in the executable process. While executing the executable process, the runtime engine encounters an optimization hint and determines an optimization to perform. The optimization hint may be related to an aspect of a business process being orchestrated by the business process flow. The optimization is then performed while executing the executable process. For example, the runtime engine may start pre-processing the branch while the condition is being evaluated. If the condition evaluates such that the pre-processed branch should be executed, then the runtime engine has already started processing of that branch. The processing is thus optimized in that the runtime engine is not sitting idle while waiting for the condition to be evaluated.
Abstract:
Systems and methods for discovering configuration data are disclosed. In accordance with one method, network configuration tokens for a system are identified. Further, potential configuration files are obtained by identifying running processes in the system, restarting the processes and monitoring the restarted processes to discover files opened by the restarted processes. In addition, files that include the identified network configuration tokens are selected from the potential configuration files. Moreover, the method includes determining, by a hardware processor, that a given token from the identified tokens is a true token by replacing the given token with a test token in at least one of the selected files, restarting the identified processes that read the given token, and identifying a change in at least one of system call activity or network activity in the system.
Abstract:
Described is an improved method, system, and computer program product for implementing an improved resequencer, along with related mechanisms and processes. An improved error handling method and system for messages is also described.
Abstract:
Described is an improved method, system, and computer program product for preventing concurrent access and processing of data by multiple threads. The inventive approach may be applied to prevent concurrent access in resequencers.
Abstract:
The technology disclosed relates to enhancing trust for person-related data sources by tracking person-related sources using trust objects that hold trust metadata. In particular, it relates to generating trust-enhanced data by appending trust metadata to social media content and other business-to-business entities, and further using the trust-enhanced data to develop social engagement models based on customer preferences. The trust metadata described includes names, interface categories and origins of the person-related data sources along with customer engagement preferences and connection types.