Abstract:
Methods, computer program products, and systems are presented. The methods include, for instance: obtaining a native code having a large number of counters embedded for profiling. Use cases that is serviced by the native code is identified and respective use case profiles representing performance characteristics of a corresponding use case are created. Best predictors identifying one of the use case profiles are determined and variants for a production code is created with only the best predictors instead of the large number of counters. The variants are produced with the use case profiles to to a production environment for performing the use cases.
Abstract:
According to one embodiment, a method for lossy data compression is provided. The method may also include determining a length and a plurality of bounding characters associated with each data item within the data message. The method may further include encoding each data item within the data message by replacing each data item with the determined length and the determined plurality of bounding characters. The method may also include transmitting the data message to a recipient.
Abstract:
Aspects of the present disclosure relate to managing power provided to devices. A first set of radio-frequency identification (RFID) power data can be read, by an RFID reader, from a first RFID tag of a first device electrically coupled to a power supply. The first set of RFID power data can specify a first amount of energy required by the first device if a power loss occurs. An indication that a power loss occurred can be received. In response to the indication that the power loss occurred, the power supply can provide the first amount of energy to the first device.
Abstract:
A method and apparatus. In response to a first mobile device not being connected to the broker service apparatus, it is ascertained that a second mobile device is connected to the broker service apparatus. A first control signal was received, prior to ascertaining that the second mobile device is connected to the broker service apparatus, by the broker service apparatus from a telephony service. The first control signal includes a first unique identifier and data targeted to the first mobile device. In response to the ascertaining, a second control signal is issued to the second mobile device in order to forward the data to the second mobile device. The second control signal includes an identifier of the first mobile device. The second control signal causes the second mobile device to use the identifier of the first mobile device to forward the data to the first mobile device.
Abstract:
According to one embodiment, a method for lossy data compression is provided. The method may also include determining a length and a plurality of bounding characters associated with each data item within the data message. The method may further include encoding each data item within the data message by replacing each data item with the determined length and the determined plurality of bounding characters. The method may also include transmitting the data message to a recipient.
Abstract:
A method and apparatus for controlling a second mobile device in response to a first mobile device having no connection to a telephony service. A first unique identifier is assigned to the first group by a broker service apparatus that is a computer apparatus. The telephony service is notified of the first unique identifier. In response to receiving a first control signal including the first unique identifier and from the telephony service, the first unique identifier is used to identify the first group. The data is targeted to the first mobile device. In response to the first mobile device not being connected to the broker service apparatus and the second mobile device being connected to the broker service apparatus, a second control signal, which includes the identifier of the first mobile device, is issued to the second mobile device in order to forward the data to the second mobile device.
Abstract:
Method and system are provided for providing elapsed time indications for source code in a development environment. The method includes: defining blocks of source code to be timed during source code execution; monitoring defined blocks of source code during execution to determine an elapsed time for the execution of the defined block of source code; recording the elapsed time for a defined block of source code; and providing an elapsed time indication for the defined block of source code.
Abstract:
A computer-implemented method includes a display. The display is for displaying a document, including a plurality of document parts. The method includes an image capture device. The method categorizes each of the plurality of document parts based on a content of each of the plurality of document parts. The method captures images of a user using the image capture device. The method determines a plurality of reading speeds for each of the plurality of document parts. The plurality of reading speeds based on the images of the user for each of the plurality of document parts. The scrolling speed for each of the plurality of document parts is based on the plurality of reading speeds and the content for each of the plurality of document parts. The method scrolls the document via the display based on the plurality of scrolling speeds for each of the plurality of document parts.
Abstract:
A method, executed by a computer, for augmenting a first performance profile with data extracted from a Just-in-Time compiler, the Just-in-Time compiler compiling bytecodes into machine instructions and generating the first performance profile, the bytecodes having an associated original call structure includes: tracking “in-lining” optimizations performed by a Just-in-Time compiler compiling bytecodes into machine instructions; extracting data associated with the tracked “in-lining” optimizations; storing the extracted data in a second profile; and augmenting the first performance profile with the extracted data associated with the tracked “in-lining” optimizations, the extracted data comprising call paths corresponding to the original call structure associated with the bytecodes. A corresponding computer program product and computer system are also disclosed herein.
Abstract:
An embodiment of the invention may include a method, computer program product and computer system for detecting a device. The embodiment may include a computing device that determines a Universally Unique Identifier (UUID) of a beacon of a second device. The computing device may determine a first location of the first device. The computing device may determine whether the UUID of the beacon of the second device matches a UUID in a list of UUIDs, where each UUID in the list of UUIDs corresponds to a beacon associated with a device. The computing device may transmitting the UUID of the beacon of the second device and the first location to a third device, based on determining the UUID of the beacon of the second device matches an entry in the list.