摘要:
A method provides for injecting a probe (302) into a computer-readable computer program having a plurality of computer-executable instructions (134). In one example, the method includes receiving the plurality of computer-executable instructions (134) from memory (130); identifying at least one original instruction (308) from the received plurality of computer-executable instructions (134) for facilitating insertion of the probe (302); creating a temporary copy of the at least one original instruction (308); and allocating a jump target of the probe (302) to a memory address in the memory (130) by assigning a predetermined value to tail bytes (312) of the probe (302).
摘要:
In one embodiment, a temperature management system comprises a plurality of thermal sensors at different locations on a chip, and a temperature manager. The temperature manager is configured to receive a plurality of temperature readings from the thermal sensors, to fit a quadratic temperature model to the received temperature readings, and to estimate a hotspot temperature on the chip using the fitted quadratic temperature model.
摘要:
Described is a way to improve efficiency in relaying software application traction data from developers to interested parties. Traction data is collected from a plurality of software applications through analytics modules. The traction data is forwarded in real-time to a network server which in turn aggregates and publishes the data in an indexed live feed. Within the live feed are controls for both subscribers and applications owners. Subscribers are enabled to configure threshold alerts concerning predetermined traction criterion. Application owners are enabled to determine which subscribers have access to traction data concerning their software application becomes available to.
摘要:
A method of executing a topology includes deriving executable logic from the topology. The method of executing the topology further includes, with an LCM engine, executing the topology based on the executable logic.
摘要:
A device for controlling a power supply for a functional block in an integrated circuit, the device comprising: a signal generator configured to provide a clock signal to the functional block, an antenna comprising a transistor, and being located proximate to the functional block, the antenna being configured to receive the clock signal from the signal generator, and wherein the transistor of the antenna receives electrical power from the same power source that delivers power to the functional block, means to measure the clock signal output from the antenna, and output a control signal, and feedback means to control the voltage of the power supply to the functional block on the basis of the control signal.
摘要:
A system for managing monitoring requirements documents comprises a graphical user interface, a processor, and a memory. The graphical user interface receives inputted information identifying a monitoring target in an enterprise and monitoring requirements for the monitoring target. The processor receives the inputted information, and determines that a monitoring requirements document does not already exist for the monitoring target. The processor creates a monitoring requirements document for the monitoring target, the monitoring requirements document specifying the monitoring requirements for the monitoring target. The processor associates the monitoring requirements document with a unique monitoring identifier. The memory stores the monitoring requirements document and the unique monitoring identifier.
摘要:
A system for securing an electronic device includes a memory, a processor, one or more operating systems residing in the memory for execution by the processor, a resource of the electronic device communicatively coupled to the operating system, a virtual machine monitor configured to execute on the electronic device at a level below all of the operating systems of the electronic device accessing the resource, and a security agent configured to execute on the electronic device at a level below all operating systems of the electronic device accessing the resource. The virtual machine monitor is configured to intercept a request of the resource made from a level above the virtual machine monitor and inform the security agent of the request. The security agent is configured to determine whether the request is indicative of malware.
摘要:
In one embodiment, a method includes, upon occurrence of multiple power state transition events for a core of a multi-core processor, reading a value of a system counter of the core and values of low power counters of the core, without expiration of a timer or triggering of an interrupt. These values can be stored in a storage of the processor. Then, after collection is completed, the storage can be accessed to determine a power profile of the processor using the stored values. Other embodiments are described and claimed.