Abstract:
Disclosed herein are methods, systems, and processes to adjust replication operations in a distributed environment. A set of replicated data is received from a first appliance as a result of a replication operation. The replication operation is initiated by the first appliance and the set of replicated data includes a first timestamp. A write operation is performed to store the set of replicated data and a second timestamp is recorded. Recovery point information is generated based on the first timestamp and the second timestamp. The recovery point information is configured to be utilized in adjusting replication parameters of a subsequent replication operation.
Abstract:
Example implementations relate to printer power management. For example, a system for printer power management may include a system power control engine to receive a power usage estimate from each of a plurality of components of a printing device and schedule a deferred service routine to identify a level of real-time performance of the plurality of components. Furthermore, a system for printer power management may include a state machine engine to estimate how close a power supply coupled to the printing device is to an over-power failure (OPF) based on the real-time performance.
Abstract:
Methods, apparatus and a system for monitoring a load time for a web page are provided. A request for a web page from a client device is received at a server. Web bugs are embedded within a code for the web page. The web bugs provide instructions to a client device for providing information to the server. The web page is transmitted to the requesting client device. A first call is received from the client device including information indicative of a start time for rendering the web page. The information indicative of the start time is logged in a memory. A second call is received from the client device including information indicative of an end time for rendering the web page. The information indicative of the end time in a memory is logged. The loading time of the requested web page is determined from the logged information.
Abstract:
A system writes to a replicated direct access storage device (DASD) a record of each step within a job as each step begins and as each step completes. The records are maintained on the replicated DASD for a predetermined period of time. The predetermined period of time is, for example, the greatest amount of lag in replication of all storage systems operating within the system. The records are stored, for example, in an open jobs and datasets (OJD) file, where the file itself is a dataset. The dataset is written to by an online task (e.g., OJDSTC) which gathers input from two sources. Upon job completion, the records are stored, for example, in an OJD journal and removed from the OJD file.
Abstract:
Various implementations described herein are directed to usage data for a marine electronics device. In one implementation, a non-transitory computer-readable medium has stored thereon a plurality of computer-executable instructions which, when executed by a computer, cause the computer to record usage data at a marine electronics device. The usage data includes data relating to at least one user input to the marine electronics device. The computer-executable instructions are further configured to cause the computer to transmit the usage data to a server computer for analysis and evaluation.
Abstract:
An operating system is provided in which an interrupt router dynamically steers each interrupt to one or more processors within set of processors based on overall load information from the set of processors. An interrupt source is assigned to a processor based on the load imposed by the interrupt source and the target overall load for the processor. For example, each processor can maintain information about each interrupt it processes over time. The operating system receives this historical load information to determine an expected load for interrupts of a given type from a given device, an overall load on the system, and a target load for each processor. Given a set of interrupt sources, their expected loads, and target load for each processor, each interrupt source can be assigned dynamically to a processor during runtime of the system. On a regular basis, these assignments can be changed given current operating conditions of the system.
Abstract:
A method of managing call data for at least one radio network element within a cellular communication network. The method comprises receiving call data for at least one call from the at least one radio network element within the cellular communication network, arranging the received call data into call data records, assembling the call data records into at least one data block, and writing the at least one data block to at least one data storage device. The method further comprises, upon receipt of a call data query, retrieving call data records from the at least one data storage device on a per data block basis.
Abstract:
Systems and methods for monitoring performance of virtualized instructions are provided. One method includes, during emulated execution of non-native program code including non-native instructions, maintaining a program flow history in a computing system representing a flow of program execution of the non-native program code. The program flow history includes a listing of non-native jump instructions for which execution is emulated in the computing system. The method also includes capturing one or more statistics regarding performance in native execution of the non- native program code on the computing system. The method further includes correlating the one or more statistics to the program flow history to determine performance of the computing system in executing one or more non-native instructions between each of the non-native jump instructions.
Abstract:
A logging system includes an event receiver and a storage manager. The receiver receives log data, processes it, and outputs a data "chunk." The manager receives data chunks and stores them so that they can be queried. The receiver includes buffers that store events and a metadata structure that stores metadata about the contents of the buffers. The metadata includes a unique identifier associated with the receiver, the number of events in the buffers, and, for each "field of interest," a minimum value and a maximum value that reflect the range of values of that field over all of the events in the buffers. A chunk includes the metadata structure and a compressed version of the contents of the buffers. The metadata structure acts as a search index when querying event data. The logging system can be used in conjunction with a security information/event management (SIEM) system.