Abstract:
The present invention relates to a computer implemented method for a logging process in a data storage system (100) comprising a set of storage tiers (115), each storage tier of the set of storage tiers (115) having different performance characteristics, wherein the set of storage tiers (115) is divided into a plurality of subsets of storage tiers (115A, 115B, 115C, 115D) using the performance characteristics, the method comprising: initiating the logging process for creating a separate log file (121A, 121B, 121C, 121D) for each of the plurality of subsets of storage tiers (115A, 115B, 115C, 115D) for maintaining a history of data changes in the subset of storage tiers, thereby creating a plurality of log files (121); in response to a change in data stored in at least one storage tier of a subset of storage tiers of the plurality of subsets of storage tiers (115), generating one or more log records comprising information about the change, and writing the one or more log records into the respective log files (121A, 121B, 21C, 121D).
Abstract:
Disclosed are guard ring structures with an electrically insulated gap in a substrate to reduce or eliminate device coupling of integrated circuit chips, methods of manufacture and design structures. The method includes forming a guard ring structure comprising a plurality of metal layers within dielectric layers. The method further includes forming diffusion regions to electrically insulate a gap in a substrate formed by segmented portions of the guard ring structure.
Abstract:
A solution is proposed for managing a database in a data-processing system. A corresponding method (600) comprises the steps of providing (606-675), for a set of virtual tables each one comprising a set of virtual columns each one of a data type, a polymorph table stored in the database and a mapping structure, the polymorph table comprising a discrimination column for storing an identifier of the virtual tables and a total number of polymorph columns of each data type equal to a maximum number of the virtual columns of the data type in the virtual tables, and the mapping structure storing mapping information mapping each virtual column to a corresponding one of the polymorph columns of the same data type, receiving (678) a virtual access request for accessing at least part of the virtual tables, the virtual access request being based on at least a selected one of the virtual columns of at least a selected one of the virtual tables, retrieving (681) selected mapping information mapping each selected virtual column to a selected one of the polymorph columns from the mapping structure, converting (684-687) the virtual access request into a polymorph access request for the polymorph table according to the identifier of said at least one selected virtual table and the selected mapping information, and accessing (690-699) the polymorph table according to the polymorph access request.
Abstract:
Embodiments of the invention relate to implementing run-time instrumentation indirect sampling by address. An aspect of the invention includes a method for implementing run-time instrumentation indirect sampling by address. The method includes reading sample-point addresses from a sample-point address array, and comparing, by a processor, the sample-point addresses to an address associated with an instruction from an instruction stream executing on the processor. The method further includes recognizing a sample point upon execution of the instruction associated with the address matching one of the sample-point addresses. Run-time instrumentation information is obtained from the sample point. The method also includes storing the run-time instrumentation information in a run-time instrumentation program buffer as a reporting group.
Abstract:
An enterprise business intelligence system includes a data access service. In one example, a method comprises receiving, with a data access service, a query and a report specification from an enterprise software application, wherein the data access service is positioned between the enterprise software application and a data source; creating a run tree that comprises a sequence of executable decoration nodes; executing the query on the data source, thereby providing a query result set comprising query results drawn from the data source that are responsive to the query; and executing the sequence of decoration nodes on the query result set, wherein each of the decoration nodes modifies the query result set, thereby producing a decorated result set based on the query result set and the one or more decoration nodes, wherein producing the decorated result set comprises associating each of one or more members or values in the query results with a corresponding position or a calculated member in the report specification.
Abstract:
A method for monitoring of stored procedures executed in a database management system is provided. The method may comprise providing, for one of the stored procedures the following event data and an identification of the stored procedure: a first time indicative of a beginning of an execution; a second time indicative of an end of the execution; at least one SQL statement identifier assigned to an SQL statement executed as part of the stored procedure; and for each SQL statement identifier a counter indicative of the number of executions for related SQL statements is executed between the first time and the second time as part of the stored procedure. Furthermore, the method may comprise providing, regular database monitoring information by the database management system, including values of parameters of executed SQL statements identifiable by the SQL statement identifier. Furthermore, the values may be correlated to the number of executions.
Abstract:
The invention is directed to a method for monitoring vibrations to detect distinct vibration events in an acceleration waveform converted into acceleration samples. The method comprises: storing the acceleration samples as a sequence of acceleration frames into a cache memory (S110); detecting the presence or absence of a distinct vibration event in each of said acceleration frames (S160); in case of detecting a distinct vibration event in an acceleration frame, forwarding said acceleration frame from said cache memory to a long-term storage device (S170).
Abstract:
An application analysis mechanism analyzes a composite application for conformance to a set of component interaction rules that define one or more conditions that should be satisfied between components written in different languages, along with an action that is performed depending on the analysis of the conditions. Once the component interaction rules are defined, the composite application is received. Next, a model of the composite application is built that separates components of the composite application into categories based on the programming language used, and includes metadata to describe interaction between components. The set of component interaction rules is then run against the model of the composite application. The results of the analysis are then output. The automated analysis of composite applications removes much of the process that is prone to human errors to provide an efficient and consistent approach for analyzing composite applications.
Abstract:
The invention provides a method and system for determining the position of a moving wireless communication device, the method comprising: recording moving path of the wireless communication device in cells of a cellular wireless communication network; recording moving path and GPS information of a GPS wireless communication device moving in the cellular wireless communication network in cells of the cellular wireless communication network; determining the GPS wireless communication device whose moving path matches with the moving path of the wireless communication device; and determining the position of the wireless communication device based on the GPS information of the matching GPS wireless communication device.
Abstract:
The invention provides an efficient, flexible P2P file transmission management technology. The invention realizes limiting and directing of P2P file transmission mainly by replacing an original tracker server with a setting controllable tracker server, and modifying node list based on predetermined rule in the controllable tracker server. With the present invention, a network operator can strengthen function of the controllable tracker server in P2P communication gradually by weakening function of the original tracker server in P2P communication gradually, and utilize various rules or policies established in advance to manage file transfer of P2P nodes.