摘要:
Embodiments of the invention provide a method for regaining memory consistency after a trap via transactional memory. Transactional memory and a transactional memory log are used to undo changes made to memory from a transaction start point up to the point of a trap event. After the trap event is processed, and the changes are rolled back, the program can resume execution at the beginning of the transaction.
摘要:
A distributed database management system implemented on a cluster of computers. The cluster including disks organized as data nodes. The data nodes being locally connected to one or more computers in the cluster. The distributed database management system includes a distributed database manager layer having a lock manager, a resource manager, and an architecture manager. The lock manager serializes access to the data nodes in the cluster. The resource manager maintains a data representation of the resources of each computer in the cluster and makes the data available to other computers in the cluster to facilitate access to the resources by the other computers. The architecture manager defines logical ownership relationships between data nodes and computers in the cluster to permit the architecture of the database to be dynamically reconfigured to provide improved performance.
摘要:
An adaptive spin latch system is provided for use in a multiprocessor computer system. The spin latch system includes a run queue, a spin latch module and a wait queue. The run queue is adapted to store agent index data correlated to at least one agent in run mode. The spin latch module is adapted to put the at least one agent into sleep mode for a period of time correlated to a number of agents awaiting access to a resource. The wait queue is adapted to store agent index data correlated to the at least one agent in sleep mode. A method of regulating access by agents to a resource in a multiprocessor computing system is also provided.
摘要:
Embodiments of the invention provide a method for regaining memory consistency after a trap via transactional memory. Transactional memory and a transactional memory log are used to undo changes made to memory from a transaction start point up to the point of a trap event. After the trap event is processed, and the changes are rolled back, the program can resume execution at the beginning of the transaction.
摘要:
distributed database management system implemented on a cluster of computers. The cluster including disks organized as data nodes. The data nodes being locally connected to one or more computers in the cluster. The distributed database management system includes a distributed database manager layer having a lock manager, a resource manager, and an architecture manager. The lock manager serializes access to the data nodes in the cluster. The resource manager maintains a data representation of the resources of each computer in the cluster and makes the data available to other computers in the cluster to facilitate access to the resources by the other computers. The architecture manager defines logical ownership relationships between data nodes and computers in the cluster to permit the architecture of the database to be dynamically reconfigured to provide improved performance.
摘要:
A method for implementing distributed database management system operations on a computer cluster. The method includes defining ownership relationships between a plurality of computers in the computer cluster and a plurality of data nodes in the computer cluster, wherein a distributed database management system operation can be directly carried out by a first computer only on those data nodes owned by the first computer. The method further includes monitoring database usage characteristics. The method further includes carrying out a re-architecture step in response to the database usage characteristics by redefining ownership relationships to improve the efficiency of the distributed database management system operations.
摘要:
A method for implementing distributed database management system operations on a computer cluster. The method includes defining ownership relationships between a plurality of computers in the computer cluster and a plurality of data nodes in the computer cluster, wherein a distributed database management system operation can be directly carried out by a first computer only on those data nodes owned by the first computer. The method further includes monitoring database usage characteristics. The method further includes carrying out a re-architecture step in response to the database usage characteristics by redefining ownership relationships to improve the efficiency of the distributed database management system operations.
摘要:
A method for implementing a set of database management components in a distributed database management system, the distributed database management system being implemented on a computer cluster. The method includes managing resources associated with an associated computer, the associated computer being one of a plurality of computers in the computer cluster. The method also includes managing locks on data stored on a plurality of associated data nodes coupled to the associated computer, wherein the associated data nodes are data nodes of a plurality of data nodes in the computer cluster. The method also includes specifying logical connections for the plurality of associated data nodes.
摘要:
A data structure, method and system are provided incorporating a general purpose memory allocator and defensive heap memory manager. This provides an ability to reliably detect various types of memory errors, dynamically enable or disable memory debugging, enhance success of read and write operations using various memory verification techniques. Further, through separation of control information associated with allocated and free chunks of memory from the chunks themselves (separation of metadata from actual data), enhanced protection of vital information about the heap memory layout in general is provided. The heap memory manager uses read, write, and execute protected heap header walls and pool header walls and may, for each pool and memory block, separately use hidden front and back Memory Debug Information Areas (MDIAs) with checksums and well-known signature fields thereby enhancing overall memory management.
摘要:
Some aspects of the invention provide methods, systems, and computer program products for inserting an encrypted problem signature into a symptom database. A problem signature is first provided, which is then used to derive a hash value. The problem signature is then encrypted using the hash value. The hash value is further used to indicate the location in the database to insert the problem signature. The problem signature is then inserted at the location in the database indicated by the location.