摘要:
Roll back strategies for database deadlock resolution are customized by identifying a first transaction to a database, identifying a second transaction to the database and detecting a deadlock between the first and second transactions with respect to the database. The deadlock is resolved based upon a predetermined roll back strategy associated with at least one of the first or second transactions to identify a select one of the first and second transactions for roll back and a request is conveyed to roll back the selected one of the first and second transactions, wherein the preferred transaction is allowed to continue processing.
摘要:
Embodiments of the present invention provide a method, system and computer program product for enforcing performance goals in an n-Tier distributed caching infrastructure. In an embodiment of the invention, a method of enforcing performance goals in an n-Tier distributed caching infrastructure can include establishing a communicative connection to multiple different cache servers arranged in respective tier nodes in an n-Tier cache. The method also can include collecting performance metrics for each of the cache servers in the respective tier nodes of the n-Tier cache and identifying a cache server amongst the cache servers in respective tier nodes of the n-Tier demonstrating a performance likely to breach at least one term of an SLA. Finally, the method can include applying a remedial measure to the identified cache server.
摘要:
Systems and methods of managing an in-memory data grid (IMDG) may involve conducting a data distribution analysis of the IMDG on a periodic basis, and selecting a hash scheme from a plurality of hash schemes based on the data distribution analysis. In one example, the selected hash scheme is used to conduct a repopulation of the IMDG, wherein the repopulation increases the distribution evenness of database records across the IMDG.
摘要:
A TTL value for a data object stored in-memory in a data grid is dynamically adjusted. A stale data tolerance policy is set. Low toleration for staleness would mean that eviction is certain, no matter the cost, and high toleration would mean that the TTL value would be set based on total cost. Metrics to report a cost to re-create and re-store the data object are calculated, and the TTL value is adjusted based on calculated metrics. Further factors, such as, cleanup time to evict data from a storage site, may be considered in the total cost.
摘要:
Embodiments of the present invention provide a method, system and computer program product for enforcing performance goals in an n-Tier distributed caching infrastructure. In an embodiment of the invention, a method of enforcing performance goals in an n-Tier distributed caching infrastructure can include establishing a communicative connection to multiple different cache servers arranged in respective tier nodes in an n-Tier cache. The method also can include collecting performance metrics for each of the cache servers in the respective tier nodes of the n-Tier cache and identifying a cache server amongst the cache servers in respective tier nodes of the n-Tier demonstrating a performance likely to breach at least one term of an SLA. Finally, the method can include applying a remedial measure to the identified cache server.
摘要:
Systems and methods of managing an in-memory data grid (IMDG) may involve conducting a data distribution analysis of the IMDG on a periodic basis, and selecting a hash scheme from a plurality of hash schemes based on the data distribution analysis. In one example, the selected hash scheme is used to conduct a repopulation of the IMDG, wherein the repopulation increases the distribution evenness of database records across the IMDG.
摘要:
A central configuration server is provided for managing user-specified configuration data for a configurable device. The central configuration server, which is separate from a configurable device to be configured, and which services a plurality of users, obtains a user identification and device information from the configurable device. Responsive to this, the central configuration server accesses an account database and uses the user identification and device information to retrieve, for the identified user, user-specified configuration data for the configurable device. The central configuration server then forwards the user-specified configuration data from the account database to the configurable device for use in automatically configuring the configurable device pursuant to the user-specified configuration data.
摘要:
Systems and methods of managing an in-memory data grid (IMDG) may involve conducting a data distribution analysis of the IMDG on a periodic basis, and selecting a hash scheme from a plurality of hash schemes based on the data distribution analysis. In one example, the selected hash scheme is used to conduct a repopulation of the IMDG, wherein the repopulation increases the distribution evenness of database records across the IMDG.
摘要:
A computer program product for database query optimization including a computer usable medium having a computer readable program, wherein the computer readable program, when executed on a computer, causes the computer to receive a database query, search the database query for a literal term, replace the literal term in the database query with a placeholder term to put the database query in a template form, search a directory for a replacement query that corresponds to the database query in the template form, replace the database query with the replacement query and include the placeholder term in the replacement query, and replace the placeholder term in the replacement query with the corresponding literal term to put the replacement query in an executable format, wherein the replacement query is an optimized substitute for the database query.
摘要:
Systems, methods and computer program products are provided for identifying a first component on a first server and a second component on a second server for co-location, where the first and second servers are within a domain boundary; inspecting available server resources within the domain boundary; determining a select server in the domain boundary for co-location based upon the inspection of available server resources; and autonomically co-locating the first and second components to the select server.