Abstract:
A system, method, and computer readable medium for providing application isolation to one or more applications. The system may include an isolated environment including application files and executables, and an interception layer intercepting access to system resources and interfaces. The system may further include an interception database maintaining mapping between the system resources inside the isolated environment and outside, and a host operating system, wherein the isolated environments are saved on at least one of a local and remote storage.
Abstract:
A computer readable medium and method providing checkpointing to Windows application groups, the computer readable medium having computer-executable instructions for execution by a processing system. The computer-executable instructions may be for launching an application and creating one or more application threads, receiving a checkpoint signal by an application thread, and entering a checkpoint Asynchronous Procedure Call (APC) handler at IRQL APC_LEVEL, the APC handler disposed in a kernel module, acquiring an ETHREAD block and user-mode context for the application thread, and examining an execution state of the one or more application threads at a time of the checkpoint signal.
Abstract:
A method and system of checkpointing multi-threaded applications, and multi-process application groups on Windows operating systems. In an exemplary embodiment, the method may include creating at least one full checkpoint for each application in an application group, and creating at least one incremental application checkpoint for each application in the application group. Further, each of the at least one incremental application checkpoint may be automatically merged against a corresponding full application checkpoint. Further, checkpointing may be synchronized across all applications in the application group. Further, checkpointing may be configured to perform live migration. In the exemplary embodiment, checkpoints are triggered asynchronously using Asynchronous Procedure Calls (APC).
Abstract:
A method and system of checkpointing single process application groups and multi-process application groups. In an exemplary embodiment, the method may include creating at least one full checkpoint for each application in an application group, and creating at least one incremental application checkpoint for each application in the application group. Further, each of the at least one incremental application checkpoint may be automatically merged against a corresponding full application checkpoint. Further, checkpointing may be synchronized across all applications in the application group. In the exemplary embodiment, each application may use both fork( ) and exec( ) in any combination.
Abstract:
A method and system for storage checkpointing of an independent computer application. The independent computer application is launched by a coordinator; and the coordinator installs at least one of an exec interceptor and a fork interceptor. The coordinator also installs at least one file operations interceptor for all file operations and registers the independent computer application with the coordinator. The independent computer application is run and the at least one file operations interceptor is called upon encountering a file operation. The file operations interceptor logs a file event in a file operations database and passes the operation to at least one of a file system, an operating system, at least one or more device drivers, and a storage disk via a storage interface. The file operations interceptor also verifies that the file operation has been issued.
Abstract:
The present invention provides a business process feature for providing universal registration in an information appliance network. The business process feature includes providing user registration information to a universal registration resource, the user registration information accessible by providers of resources via the information appliance network. The business process feature further includes requesting use of a provider resource requiring the user registration information wherein the provider resource automatically retrieves the user registration information from the universal registration resource to enable the user to access the resources. Additionally, the present invention provides a method for providing universal registration, including accessing a resource, passing a registration interface dynamic base object to the resource, and interrogating the registration interface dynamic base object for registration information. The registration interface dynamic base object transfers the interrogation for registration information to a registration implementation dynamic base object, the registration implementation dynamic base object capable of providing registration information.
Abstract:
An improved method for processing a sector of data read from a CD-ROM which has been encoded using a cross-interleaved Reed Solomon (CIRS) code is time linear in the number of errors in the sector. The improved method iteratively processes the data values from the sector, which appear in each of the sets of cross-interleaved sequences, through an error detection/correction algorithm. In the first pass, a syndrome is generated for each sequence in each set. If the syndrome indicates that the sequence either contains no errors or an undetectable number of errors, the sequence is marked as being error-free. If a sequence contains a correctable error, the error is corrected and the sequence is marked as being error-free. If the syndrome indicates that the sequence contains a number of errors which may be detected but not corrected the sequence is marked as containing errors. After the first pass the improved method only calculates an error syndrome for the sequences which are marked as containing errors. The sequences in this subset are those which are determined by the method to possibly contain an error. If an error is corrected in a sequence from one of the sets during any of the passes, the sequence from the cross-interleaved set which includes the error-corrected value is marked as containing errors to ensure that its syndrome is recalculated during the next pass.
Abstract:
A method and system of checkpointing multi-threaded applications, and multi-process application groups on WINDOWS® operating systems. In an exemplary embodiment, the method may include creating at least one full checkpoint for each application in an application group, and creating at least one incremental application checkpoint for each application in the application group. Further, each of the at least one incremental application checkpoint may be automatically merged against a corresponding full application checkpoint. Further, checkpointing may be synchronized across all applications in the application group. Further, checkpointing may be configured to perform live migration. In the exemplary embodiment, checkpoints are triggered asynchronously using Asynchronous Procedure Calls (APC).
Abstract:
A system, method, and computer readable medium for reliable messaging between two or more servers. The computer readable medium includes computer-executable instructions for execution by a processing system. Primary applications runs on primary hosts and one or more replicated instances of each primary application run on one or more backup hosts. The reliable messaging ensures consistent ordered delivery of messages in the event that messages are lost; arrive out of order, or in duplicate. The messaging layer operates over TCP or UDP with our without multi-cast and broad-cast and requires no modification to applications, operating system or libraries.
Abstract:
A system, method, and computer readable medium for maintaining mappings between resources inside an isolated environment and outside the isolated environment for one or more applications. The system may include a plurality of lists of resources requested by the one or more applications during installation and while executing, and a corresponding lists of resources inside the isolated environment. The system may also include a list of resource exceptions, wherein the mappings between resources as requested by the applications and their corresponding values in the isolated environment are maintained subject to the list of exceptions.