摘要:
A method and apparatus for configuring a computer system is adapted to allow configuration to occur on the system unit without removing the system unit from its packaging. By so preparing and operating the unit that it can function to a degree as a network client, it is possible to perform steps for configuring "in the package" that violate normal self test expectations. With this abnormal operating environment and operation the system is placed in condition to be removed from the packaging at the user's location with BIOS and program image customized for the user. This approach provides a freshly configured system and yet eliminates unpacking at a configuration center and then repacking for transfer to the user or the need for refresh configuration at the user site as the system unit is set up for normal use.
摘要:
Apparatus for configuring a computer system is adapted to allow configuration to occur on the system unit without removing the system unit from its packaging. By so preparing and operating the unit that it can function to a degree as a network client, it is possible to perform steps for configuring "in the package" that violate normal self test expectations. With this abnormal operating environment and operation the system is placed in condition to be removed from the packaging at the user's location with BIOS and program image customized for the user. This approach provides a freshly configured system and yet eliminates unpacking at a configuration center and then repacking for transfer to the user or the need for refresh configuration at the user site as the system unit is set up for normal use.
摘要:
A method and apparatus for identifying problems associated with a web site. A scan of a web site is initiated by a plurality of agents, wherein each of the plurality of agents are at a different location in the distributed data processing system. Results of the scan are obtained from the plurality of agents. The results of the scan are analyzed to determine if a problem is associated with the web site.
摘要:
A barrier synchronization program product in a distributed computing environment. A group of members, including a plurality of related processes executing on one or more processors of the distributed computing environment, is provided a protocol having a dynamic number of synchronization phases. The protocol is voted on by one or more members of the group to determine how the protocol should proceed for the group of members. The protocol may complete successfully, continue to another synchronization phase or be rejected. The group of members determines how many synchronization phases the protocol is to include.
摘要:
A method of performing a parallel join operation on a pair of relations R1 and R2 in a system containing P processors organized into Q clusters of P/Q processors each. The system contains disk storage for each cluster, shared by the processors of that cluster, together with a shared intermediate memory (SIM) accessible by all processors. The relations R1 and R2 to be joined are first sorted on the join column. The underlying domain of the join column is then partitioned into P ranges of equal size. Each range is further divided into M subranges of progressively decreasing size to create MP tasks T.sub.m,p, the subranges of a given range being so sized relative to one another that the estimated completion time for task T.sub.m,p is a predetermined fraction that of task T.sub.m-1,p. Tasks T.sub.m,p with larger time estimates are assigned (and the corresponding tuples shipped) to the cluster to which processor p belongs, while tasks with smaller time estimates are assigned to the SIM, which is regarded as a universal cluster (cluster 0). The actual task-to-processor assignments are determined dynamically during the join phase in accordance with the dynamic longest processing time first (DLPT) algorithm. Each processor within a cluster picks its next task at any given decision point to be the one with the largest time estimate which is owned by that cluster or by cluster 0.
摘要:
The number of instances of an application running in a computing environment are controlled by monitoring the current load on the application, and altering the current number of instances of the application based on results of the monitoring. The load may be monitored by monitoring the current number of instances of the application running in the computing environment. Where a maximum, minimum and/or initial number on startup, of instances of the application are specified, the altering is done based on comparing the current number to one or more of the specified numbers of instances.
摘要:
Program product for an application programming interface that unifies a plurality of mechanisms into a single framework. The interface includes a mechanism for communicating between members of a process group of related processes, and a mechanism for synchronizing the related processes of the process group. Additionally, the application programming interface may include mechanisms for managing membership of the process group or a processor group of processors, and/or a mechanism for controlling a group state value for the process group.
摘要:
A method and apparatus for minimizing the time required to obtain results for a content based query in a data base. More specifically, with this invention, the data base is partitioned into a plurality of groups. Then, a schedule or sequence of groups is assigned to each of the operations of the query, where the schedule represents the order in which an operation of the query will be applied to the groups in the schedule. Each schedule is arranged so that each application of the operation operates on the group which will yield intermediate results that are closest to final results.
摘要:
A scanning tool executing on a host computer may be used to scan a server only if the server (or a proxy) first exposes to the host a certificate that, upon processing by the host, indicates that the server may be scanned. The certificate preferably encrypts a scan permission and is made available from a given port on the server (or the proxy). Whenever the host desires to perform a scan of the server, the host searches the port for the certificate. The certificate is then decrypted to determine whether the scan permission exists. If so, the scan then proceeds, in accordance with any conditions set forth in the decrypted scan permission.
摘要:
A method, computer program product and a program storage device embodying software for measuring of the response time of an application (including distributed applications in a client/server or Internet environment) as perceived by an end-user. One aspect deals with the measurement of components of the response time and relating those components to user response time. In addition, the components of one transaction can be matched (or correlated) to each other even though they are measured on different systems. The generation of events and transactions can be controlled, allowing their creation to occur as close to their point of origin as practical. Both aggregate and detail reporting facilities provide overall performance and availability information as well as exceptions and/or detail transactions including the decomposition of overall availability and performance metrics into smaller measurements representing the contribution made by select transaction components. An interactive reporting facility enables the selection of a level of transaction decomposition desired. This enables the identification of the transaction components that are introducing delays or faults. The system is extensible, enabling the addition of components to the system that extend its measurement and reporting capabilities. In particular, a language has been created to facilitate the definition of the end-to-end business application transactions. Also, select APIs as well as application data structures allow the addition of software and/or hardware modules to extend the system. The system can also adapt to the presence or absence of select streams of events without having to change its mode of operation. Measurement sources that generate events can be dynamically activated and deactivated.