Abstract:
A computing device implemented method includes, at a font monitor, receiving data representing one or more activities related to providing one or more fonts to the computing device from a font service provider. The method also includes identifying at least one of the one or more activities as being associated with an unauthorized activity, and, initiating action to correct the at least one activity associated with the unauthorized activity.
Abstract:
A first computing device is provided for rolling back a computing environment. The computing device includes processors configured to acquire a stream containing entries including snapshot entries, memory entries, and input/output entries wherein each entry includes information and is associated with a timestamp. The processors are further configured to receive a snapshot entry associated with a first timestamp, revert to a memory state using information provided in at least one memory entry associated with a timestamp after the first timestamp, and re-execute a previously executed process, wherein the re-execution of the process is started using the first timestamp, information from the received snapshot entry, and information for input/output operations corresponding to the input/output entries associated with timestamps after the first timestamp.
Abstract:
A performance monitoring system is described herein that works with a hypervisor to reserve resources outside of a virtual machine to monitor performance of an application running within the virtual machine. The application receives the guaranteed amount of resources specified by the virtual machine's specifications, and the monitoring consumes resources not associated with the virtual machine. The application running in the virtual machine is already isolated by the hypervisor from the physical machine, and thus additional burdens on the physical machine that allow the hypervisor to continue meeting guarantees to the virtual machine will not impact application performance. The performance monitoring system provides instrumentation of deployed applications that information technology (IT) personnel can dynamically turn on and off without affecting the performance of the deployed application. The performance monitoring system provides a robust framework for monitoring production applications without affecting the performance of those applications during execution.
Abstract:
A method monitors machine activity of multiple virtual computing devices operating through at least one physical computing device by running a monitoring agent. The method measures simple operating characteristics of only a base level virtual computing device and monitors complex operating characteristics by measuring the characteristics for each virtual computing device, recording the operating characteristics of each virtual computing device on a corresponding memory page of each virtual computing device, and sharing each the corresponding memory page with the base level virtual computing device through an interdomain communications channels to transfer the complex operating characteristics to the monitoring agent. The method identifies and outputs simple events and complex events for each of the multiple virtual computing devices by evaluating the simple operating characteristics and the complex operating characteristics.
Abstract:
Detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. In an embodiment, a method for observing mobile device behaviors over a period of time to recognize mobile device behaviors inconsistent with normal operation patterns is disclosed. The method comprises determining in a processor of a mobile device a feature that is to be observed in the mobile device in order to identify a suspicious behavior of the mobile device, and adaptively observing the determined feature by collecting behavior information from a hardware component associated with the determined feature.
Abstract:
Mechanisms are provided for energy management signalling with an apparatus for processing data, such as a system-on-chip integrated circuit (2). Processing circuitry (6, 8, 10) is coupled to consumer energy interface circuitry (14, 16, 18) which communicates with energy management circuitry (4). The energy management signals which are communicated include a static power consumption signal indicative of a level of power consumption which is independent of processing operations being performed and a dynamic power consumption signal indicative of a level of dynamic power consumption which is dependent upon the processing operations being performed.
Abstract:
Circuitry detects properties of an accessory removably connected thereto via a multi- pole connector. The circuitry has first, second and third circuit terminals for coupling to respective first, second, and third poles of said connector, and has an output for providing evaluation values from which properties of the accessory may be derived. In the circuitry, first current sourcing circuitry is coupled to said first circuit terminal for providing a first current. A switch network comprises first, second, third and fourth switch network terminals, said first switch network terminal coupled to a reference potential, said second switch network terminal coupled to said second circuit terminal, and said third switch network terminal coupled to said third circuit terminal. Comparator circuitry provides a comparison signal, its first input terminal being coupled to said first circuit terminal. Second current sourcing circuitry having a monitor node coupled to said second comparator input terminal and an output node coupled to said fourth switch network terminal provides a second current to said switch network. At least one of said first current sourcing circuitry and said second current-sourcing circuitry is responsive to a digital control word for varying said first or said second current. Control logic is provided for operatively controlling the state of the interconnections of said switch network, for adjusting said digital control word in response to said comparison signal until a voltage at said first circuit terminal is equal to a voltage at said monitor node, and for supplying said adjusted digital control word associated with the state of the interconnections to said output as an evaluation value.
Abstract:
A debugging and diagnostics system allows users to take lightweight process snapshots of running debuggee processes so the users may analyze those snapshots at a later time. The snapshot mechanism allows diagnostic tools to compare an original process or one or more process snapshots or to compare any of a series of snapshots to each other. The snapshot mechanism further allows users to inspect a snapshot of process memory while allowing the original process to continue running with minimal impact. A user may do historical debugging using process snapshots of a debuggee process taken over time. This allows the user to view the state of the debuggee process as it existed when the snapshot was taken. The lightweight process snapshot is less invasive because it does not require a full copy of the memory and allows the original process to run un-interrupted while specific collections and inspections are completed.
Abstract:
Systems and methods provide for the processing of data including monitoring functions. A blade enclosure for processing data includes: at least one first blade server configured to only perform routine processing tasks; and at least one second blade server connected to the at least one first blade server and configured to perform monitoring functions, wherein the at least one first blade server is configured to offload received data which requires monitoring to the at least one second blade server, and wherein the routine processing tasks do not include monitoring functions.