摘要:
A method for determining a suspect memory leak, including: sampling the throughput and memory usage of an application server; based on the sampled throughput, monitoring whether the throughput decrease continually, and based on the sampled memory usage, monitoring whether the memory usage remains stable within a predefined range; in response to a continual decrease of the throughput and the memory usage remaining stable within the predetermined range, determining that the application server is suspected of having a memory leak. Using the solution of the present invention can free an administrator of the burden of artificially identifying suspect servers, can identify a suspect server during runtime and further determine whether it actually has a memory leak.
摘要:
A method for determining a suspect memory leak, including: sampling the throughput and memory usage of an application server; based on the sampled throughput, monitoring whether the throughput decrease continually, and based on the sampled memory usage, monitoring whether the memory usage remains stable within a predefined range; in response to a continual decrease of the throughput and the memory usage remaining stable within the predetermined range, determining that the application server is suspected of having a memory leak. Using the solution of the present invention can free an administrator of the burden of artificially identifying suspect servers, can identify a suspect server during runtime and further determine whether it actually has a memory leak.
摘要:
A method of sharing virtual machine resources. The method includes: in response to at least one user logging in to the virtual machine, monitoring file operations taken by the user in the virtual machine; recording the types of file operations; in response to the user logging out from the virtual machine, restoring the virtual machine back to the original state at the time when the user logged in to the virtual machine according to the recorded types of file operations; and in response to receiving a request for virtual machine resources, assigning one of the virtual machines which is idle and restored back to the original state to the requesting user.
摘要:
Embodiments of the present invention relate to methods and apparatuses for enabling cluster scaling. Specifically, there is disclosed a method of recording a context of configuration for an initial node of a cluster, comprising: retrieving at least one file to be used for configuring the initial node; and recording a context while configuring the initial node using the at least one file, the recorded context being information on the configuration of the initial node and to be used for enabling addition of a new node into the cluster. There is also disclosed a method of enabling addition of a new node into a cluster. Corresponding apparatuses are also disclosed. According to embodiments of the present invention, the efficiency of improving cluster scaling may be effectively improved.
摘要:
Embodiments of the present invention relate to methods and apparatuses for enabling cluster scaling. Specifically, there is disclosed a method of recording a context of configuration for an initial node of a cluster, comprising: retrieving at least one file to be used for configuring the initial node; and recording a context while configuring the initial node using the at least one file, the recorded context being information on the configuration of the initial node and to be used for enabling addition of a new node into the cluster. There is also disclosed a method of enabling addition of a new node into a cluster. Corresponding apparatuses are also disclosed. According to embodiments of the present invention, the efficiency of improving cluster scaling may be effectively improved.
摘要:
Embodiments of the present invention relate to methods and apparatuses for enabling cluster scaling. Specifically, there is disclosed a method of recording a context of configuration for an initial node of a cluster, comprising: retrieving at least one file to be used for configuring the initial node; and recording a context while configuring the initial node using the at least one file, the recorded context being information on the configuration of the initial node and to be used for enabling addition of a new node into the cluster. There is also disclosed a method of enabling addition of a new node into a cluster. Corresponding apparatuses are also disclosed. According to embodiments of the present invention, the efficiency of improving cluster scaling may be effectively improved.
摘要:
Embodiments of the present invention relate to methods and apparatuses for enabling cluster scaling. Specifically, there is disclosed a method of recording a context of configuration for an initial node of a cluster, comprising: retrieving at least one file to be used for configuring the initial node; and recording a context while configuring the initial node using the at least one file, the recorded context being information on the configuration of the initial node and to be used for enabling addition of a new node into the cluster. There is also disclosed a method of enabling addition of a new node into a cluster. Corresponding apparatuses are also disclosed. According to embodiments of the present invention, the efficiency of improving cluster scaling may be effectively improved.
摘要:
A method of sharing virtual machine resources. The method includes: in response to at least one user logging in to the virtual machine, monitoring file operations taken by the user in the virtual machine; recording the types of file operations; in response to the user logging out from the virtual machine, restoring the virtual machine back to the original state at the time when the user logged in to the virtual machine according to the recorded types of file operations; and in response to receiving a request for virtual machine resources, assigning one of the virtual machines which is idle and restored back to the original state to the requesting user.
摘要:
Disclosed are compounds of Formula A: (structurally represented) where “RG1”, “RG2a”, “RG4”, “RG5”, “MG1”, “n” and “m” are defined herein which compounds are antagonists of A2A receptor. Disclosed herein also are uses of the compounds described herein as antagonists of the A2a receptor in the potential treatment or prevention of neurological disorders and diseases in which A2A receptors are involved. Disclosed herein also are pharmaceutical compositions comprising these compounds and uses of these pharmaceutical compositions.
摘要:
A business object model, which reflects data that is used during a given business transaction, is utilized to generate interfaces. This business object model facilitates commercial transactions by providing consistent interfaces that are suitable for use across industries, across businesses, and across different departments within a business during a business transaction. In some operations, software creates, updates, or otherwise processes information related to an appointment activity business object.