摘要:
Systems (100) and methods (200) for managing transactional processing. The methods involve executing a first transaction (120) which is blocked by an exclusive lock of at least one second transaction (110) from accessing at least one resource of a system. Thereafter, a determination is made as to whether a Service Level Agreement (“SLA”) associated with the first transaction is being met. If it is determined that the SLA is not being met, the resources needed by the first transaction are identified. Subsequently, all executing transactions, that are using the resources needed by the first transaction, are identified. At least one of the identified transactions is then dynamically slowed down or speed up. The transaction is slowed down or sped up by: adjusting how many records are to be processed in each sub-transaction of the transaction; and/or increasing or decreasing the time period between commit operations of the transaction.
摘要:
Systems (100) and methods (200) for managing transactional processing. The methods involve executing a first transaction (120) which is blocked by an exclusive lock of at least one second transaction (110) from accessing at least one resource of a system. Thereafter, a determination is made as to whether a Service Level Agreement (“SLA”) associated with the first transaction is being met. If it is determined that the SLA is not being met, the resources needed by the first transaction are identified. Subsequently, all executing transactions, that are using the resources needed by the first transaction, are identified. At least one of the identified transactions is then dynamically slowed down or speed up. The transaction is slowed down or sped up by: adjusting how many records are to be processed in each sub-transaction of the transaction; and/or increasing or decreasing the time period between commit operations of the transaction.
摘要:
Systems (100) and methods (200) for managing transactional processing. The methods involve executing a first transaction (120) which is blocked by an exclusive lock of at least one second transaction (110) from accessing at least one resource of a system. Thereafter, a determination is made as to whether a Service Level Agreement (“SLA”) associated with the first transaction is being met. If it is determined that the SLA is not being met, the resources needed by the first transaction are identified. Subsequently, all executing transactions, that are using the resources needed by the first transaction, are identified. At least one of the identified transactions is then dynamically slowed down or speed up. The transaction is slowed down or sped up by: adjusting how many records are to be processed in each sub-transaction of the transaction; and/or increasing or decreasing the time period between commit operations of the transaction.
摘要:
Systems (100) and methods (200) for managing transactional processing. The methods involve executing a first transaction (120) which is blocked by an exclusive lock of at least one second transaction (110) from accessing at least one resource of a system. Thereafter, a determination is made as to whether a Service Level Agreement (“SLA”) associated with the first transaction is being met. If it is determined that the SLA is not being met, the resources needed by the first transaction are identified. Subsequently, all executing transactions, that are using the resources needed by the first transaction, are identified. At least one of the identified transactions is then dynamically slowed down or speed up. The transaction is slowed down or sped up by: adjusting how many records are to be processed in each sub-transaction of the transaction; and/or increasing or decreasing the time period between commit operations of the transaction.
摘要:
A Homologous Pairing Capture Assay is described which enables detection of coalignment between homologous DNA sequences. The assay involves ligating closely positioned homologous sequences to each other thereby generating head-to-head ligation products or inverted repeats. DNA fragments containing an inverted repeat are then converted into hairpin DNA molecules. The hairpin DNA molecules can then be readily separated from DNA molecules free of inverted repeats. Also described are various diagnostic applications and kits relating to the assay.
摘要:
A configuration management database (CMDB) that associates a policy with a configuration item (CI) in the CMDB. The policy contains an “applies to” field and a “type descriptor”. When a relationship is created between the CI and a second CI in the CMDB, the policy is associated with the second CI. The type descriptor of the policy may be evaluated and the policy associated with the second CI in response to the evaluation. The policy may contain a type descriptor comprising an instance of a CI type. The policy may contain a type descriptor comprising a CI type. The policy may contain an “applies to” field having a value of “this CI type”. The policy may contain an “applies to” field having a value of “hosting environment of this CI type”. The type descriptor may include a hosted CI component portion and a hosting CI component portion.
摘要:
A method for policy-based program optimization of existing software code is performed where the code is segmented into code modules. The optimization is based on a performance policy that defines a target characteristic and a sacrificial characteristic relating to the existing software code and further defines an allowable degradation of the sacrificial characteristic resulting from optimization of the target characteristic. This method may include identifying code modules that contribute to suboptimal performance of the software code with respect to the target characteristic; identifying code transformations that increase performance of the suboptimal code modules with respect to the target characteristic; and optimizing the identified code modules by selectively applying the code transformations in accordance with the performance policy to increase performance of the software code with respect to the target characteristic.
摘要:
The present invention provides a method, system, and computer program product for the autonomic installation and configuration of an enterprise business process on-demand. The method comprises: providing a business process document for expressing the business process, wherein the business process comprises a plurality of components and a workflow; providing a plurality of installation documents, where each installation document describes an installation of a component of the business process; providing a mapping document for mapping each component of the business process to at least one of the installation documents describing the installation of that component; and provisioning the business process on-demand using the business process document, the installation documents, and the mapping document.
摘要:
This application discloses a debug tool to prompting display of at least a portion of a simulated output for a circuit design in a debug window, identifying a marker corresponding to a value in the simulated output has been specified for the debug environment, and prompting accentuation of one or more occurrences of the value in the debug window relative to other values in the simulated output based, at least in part, on the marker specified for the debug environment.
摘要:
A method, system and apparatus for autonomically configuring a virtual log. In accordance with the present invention, events flowing into the virtual log can be heuristically processed to determine if any events have been lost. When an event is considered to have been lost, the size of the log associated with the event can be increased. Also, the interval in which the virtual log interacts with the associated log can be decreased so as to ensure that the events will not continue to be lost. When a period of time has elapsed during which no events are heuristically determined to have been lost, either or both of the interval and associated log can be adjusted so as to increase the interval and decrease the size of the associated log.