摘要:
Methods, systems and computer program products for suspend profiles and hinted suspending. Exemplary embodiments include a suspend mode management method, including determining a task to perform in the computer system during a suspend period of the computer system, detecting a suspend event in the computer system, the suspend event initiating the suspend period and performing the task during the suspend period.
摘要:
Methods, systems and computer program products for suspend profiles and hinted suspending. Exemplary embodiments include a suspend mode management method, including determining a task to perform in the computer system during a suspend period of the computer system, detecting a suspend event in the computer system, the suspend event initiating the suspend period and performing the task during the suspend period.
摘要:
A method, system, and computer program product for preemptive page eviction in a computer system are provided. The method includes identifying a region in an input file for preemptive page eviction, where the identified region is infrequently accessed relative to other regions of the input file. The method also includes generating an output file from the input file, where the identified region is flagged as a page for preemptive page eviction in the output file. The method further includes loading the output file to a memory hierarchy including a faster level of memory and a slower level of memory, wherein the flagged page is preemptively written to the slower level of memory.
摘要:
A continuously operating system is provided and includes a processor and a computer readable medium to which the processor is operatively coupled, the computer readable medium having executable instructions stored thereon which, when executed, cause the processor to continuously load an operating system and to simultaneously operate as at least first and second mechanisms. The first mechanism loads a new module, which is a new version of an in-memory module of the operating system, into the operating system, and the second mechanism isolates and interrupts current access to the in-memory module such that subsequent access is to the new module.
摘要:
A portable computing device is provided. The portable computing device includes a power source for providing a power supply in accordance with a power consumption policy, a processing unit operably coupled to the power source and a storage unit. The storage unit is operably coupled to the power source and the processing unit and configured to cause the processing unit to access geo-location data and to adjust the power consumption policy based on the geo-location data.
摘要:
A computing device includes a first processor configured to operate at a first speed and consume a first amount power and a second processor configured to operate at a second speed and consume a second amount of power. The first speed is greater than the second speed and the first amount of power is greater than the second amount of power. The computing device also includes a scheduler configured to assign processes to the first processor only if the processes utilize their entire timeslice.
摘要:
Receiving an input authentication pattern, the input authentication pattern including non-alphanumeric input data. Determining if the input authentication pattern matches a previously stored authentication pattern. Providing access to a computing resource if the input authentication pattern matches the previously stored authentication pattern.
摘要:
A method, system, and computer program product for preemptive page eviction in a computer system are provided. The method includes identifying a region in an input file for preemptive page eviction, where the identified region is infrequently accessed relative to other regions of the input file. The method also includes generating an output file from the input file, where the identified region is flagged as a page for preemptive page eviction in the output file. The method further includes loading the output file to a memory hierarchy including a faster level of memory and a slower level of memory, wherein the flagged page is preemptively written to the slower level of memory.
摘要:
Receiving an input authentication pattern, the input authentication pattern including non-alphanumeric input data. Determining if the input authentication pattern matches a previously stored authentication pattern. Providing access to a computing resource if the input authentication pattern matches the previously stored authentication pattern.
摘要:
A zero-trust policy is implemented in storage reports to provide a preventative measure against potential attack vectors. Introspection of a guest memory having a guest memory layout is performed. An operating system (OS) memory map is accepted. The guest memory layout is compared with the OS memory map. When the guest memory layout matches the OS memory map, the OS memory map is used to obtain one or more interested memory segments, and data processing is performed.