摘要:
Embodiments of the present disclosure relate to improving computer performance. An action may be issued to a first client and a second client. A first optimization factor list (OFL) may be generated for the first client and a second OFL may be generated for the second client. After each OFL is generated, the first OFL may be compared to the second OFL. A correlation factor (CF) may be generated between the first client and the second client based on the OFL comparison, wherein the CF indicates a level of similarity between the first client and the second client. A bottleneck causing performance issues in the first client may be determined and computer configuration of the first client may be adjusted based on the bottleneck.
摘要:
A system and method for efficient matching regular expression patterns across multiple packets. A deep packet inspection system can be embodied in a switch ASIC using a flow tracker and a signature matching engine. The flow tracker can be positioned in an ingress portion of the switch ASIC at a location where packets in a bi-direction flow can be observed and recorded. The flow tracker generates a signature match request that is forwarded to a signature matching engine in an auxiliary pipeline. The signature matching engine is enabled to perform cross-packet signature matching using signature matching state machines and reports the signature matching results to the flow tracker using a response packet that is sent to the ingress pipeline.
摘要:
A system and method for efficient matching regular expression patterns across multiple packets. A deep packet inspection system can be embodied in a switch ASIC using a flow tracker and a signature matching engine. The flow tracker can be positioned in an ingress portion of the switch ASIC at a location where packets in a bi-direction flow can be observed and recorded. The flow tracker generates a signature match request that is forwarded to a signature matching engine in an auxiliary pipeline. The signature matching engine is enabled to perform cross-packet signature matching using signature matching state machines and reports the signature matching results to the flow tracker using a response packet that is sent to the ingress pipeline.
摘要:
A routing method, apparatus, and communications system are provided. A routing method is applied to a network shared by multiple operators. The method includes: when receiving a service request message of a user terminal, obtaining, according to the shared resources occupied by the user terminal, the information about the operator to which the occupied shared resources belong from the resource configuration database; and matching the routing information in the connection route list according to the information about the operator to which the occupied shared resources belong, and forwarding the service request message according to successfully matched routing information. With the technical solutions, the operator to which the shared resources belong can charge for the call services of the user terminal.
摘要:
Start times are determined for jobs to be executed in the future in a multi-cluster environment. The start times are, for instance, the earliest start times in which the jobs may be executed. The start times are computed in logarithmic time, providing processing efficiencies for the multi-cluster environment. Processing efficiencies are further realized by employing parallel processing in determining the start times.
摘要:
Remote computing resource service providers allow customers to reduce overhead by using computer hardware resources of the service provider to execute a variety of operations. Computer hardware resources of the service provider may be widely distributed between various geographic locations and may have differing computing capacity. Therefore it may be advantageous to coordinate processing of customer operations between computer hardware resource locations of the service provider. Customer requests to perform operations may be distributed to various locations and coordinated by the service provider using various techniques such as a cancellation manager to terminate unprocessed requests distributed to the various locations once one or more of the distributed requests have been processed.
摘要:
A cleanup method and device for a terminal resource and a terminal. The method comprises: receiving a cleanup instruction, and acquiring a resource saved on a terminal according to the cleanup instruction (S101); processing the resource, and saving the processed resource, wherein a storage space occupied by the processed resource is less than a storage space occupied by the resource (S102); and querying whether a resource is saved on a server, if the resource is saved on the server, then displaying deletion prompt information, and deleting the resource according to an operation executed by a user (S103). By means of the cleanup method and device and the terminal, the storage space of the terminal occupied by a resource can be greatly reduced, and at the same time, convenience can be provided for a user to redisplay the resource since it is guaranteed that the corresponding resource is saved on a server before the resource is deleted.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for presenting content items. In one aspect, a method includes identifying an opportunity to present a content item at a device and in a manner that precludes a user from accessing content of one or more applications executing on the device. Data relating to a status of each of the one or more applications are identified. A level of urgency for a user to access content of the one or more applications is determined based on the data. A response to the opportunity to present a content item is selected based on the level of urgency for the user to access content of the one or more applications. The response is selected from a first response that causes presentation of the content item and a second response that precludes presentation of the content item.
摘要:
A computer-implemented method for performing backups may include identifying a request to back up a client system. The computer-implemented method may also include identifying a plurality of backup servers available to the client system via a network. The computer-implemented method may further include pairing the client system with a backup server in the plurality of backup servers based on a measure of network proximity between the client system and the backup server. The computer-implemented method may additionally include performing the requested backup of the client system via the backup server as a result of the pairing. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for presenting content items. In one aspect, a method includes identifying an opportunity to present a content item at a device and in a manner that precludes a user from accessing content of one or more applications executing on the device. Data relating to a status of each of the one or more applications are identified. A level of urgency for a user to access content of the one or more applications is determined based on the data. A response to the opportunity to present a content item is selected based on the level of urgency for the user to access content of the one or more applications. The response is selected from a first response that causes presentation of the content item and a second response that precludes presentation of the content item.