摘要:
A method, system, and computer program product for in-band communication with virtual machines via a hypervisor message bus are provided. The method includes establishing communication between a hypervisor and a plurality of virtual machines via a hypervisor message bus, where the hypervisor manages resources in a shared system. The method further includes transmitting a message from the hypervisor to the virtual machines using the hypervisor message bus. The method also includes translating the message within the virtual machines into a display-formatted message for in-band display on one or more user systems, and relaying the display-formatted message from the virtual machines to the one or more user systems to provide in-band communication of the message to one or more users.
摘要:
Storing and operating an information object. An indicator associated with the information object is read. The indicator indicates that a historical information is stored for the information object. Responsive to determining from the historical information that the information object has been historically accessed, (a) future access time based on the historical information is determined; (b) a trigger for placing the information object in a storage device at a predetermined time before the future access of the information object is scheduled, the trigger being associated with a scheduled time; and (c) responsive to the scheduled time elapsing, the trigger is executed. When the trigger is executed, the information object is placed in said storage device.
摘要:
An intelligent electrical connector system may include an electrical connector, and a transceiver carried by the electrical connector. The system may also include a second electrical connector, and a second transceiver carried by the second electrical connector. The second transceiver may relay interface information to the transceiver regarding the second electrical connector's parameters.
摘要:
A computer readable medium is provided and has instructions stored thereon, which, when executed cause a processor of a computing system to execute a method of controlling the computing system. The method includes iteratively running a workload over a period of time, the workload being defined by software components of a software repository of the computing system, measuring power consumption associated with the running of the workload with each iteration and storing data indicative of the power consumption, analyzing the data and identifying, from a result of the analysis, power consumption changes over the period of time, generating a regression profile based on the power consumption changes, and managing the software components in accordance with the regression profile.
摘要:
Methods, systems and computer program products for scheduler penalty for swapping activity. Exemplary embodiments include a memory management method, including identifying a first process from an active queue, identifying a second process from the active queue, tracking attributes associated with the first and second processes, determining whether at least one of the first and second processes are constraining system memory and penalizing at least one of the first and second processes in response to at least one of the first and second processes constraining the system memory.
摘要:
A continuously operating system is provided and includes a processor and a computer readable medium to which the processor is operatively coupled, the computer readable medium having executable instructions stored thereon which, when executed, cause the processor to continuously load an operating system and to simultaneously operate as at least first and second mechanisms. The first mechanism loads a new module, which is a new version of an in-memory module of the operating system, into the operating system, and the second mechanism isolates and interrupts current access to the in-memory module such that subsequent access is to the new module.
摘要:
Introspection data comparison is implemented utilizing hypervisor guest introspection data. A hypervisor shim on a hypervisor is used to construct one or more workload management components that are independent from a participating pool member of a pool comprising a guest having a guest memory and a guest operating system. The hypervisor collects a first set of data. The guest sends a second set of data comprising guest memory data from the guest memory. The first set of data is compared with the second set of data to detect at least one of a potential security intrusion or an anomalous deviation between the first set of data and the second set of data. A policy manager takes action based upon a result of the comparison of the first and second sets of data.
摘要:
Methods, systems and computer program products for utilizing system configuration information to determine a data migration order. The method includes computer instructions for establishing communication from a source virtual machine to a target virtual machine, the source virtual machine including a memory. The configuration information associated with the source virtual machine is determined and utilized to determine an order of migration for pages in the memory. The pages in the memory are transmitted to the target virtual machine in the order of migration.
摘要:
Methods, systems, and computer program products for tracking updates during memory migration. The method includes computer instructions for establishing communication from a source virtual machine to a target virtual machine, the source virtual machine including a memory. Contents of the memory on the source virtual machine are transmitted to the target virtual machine. The contents include a plurality of pages. Pages in the memory that are modified subsequent to being transmitted to the target virtual machine are tracked. The tracking includes creating a data structure having a plurality of bits corresponding to the pages in the memory, the bits indicating if the corresponding pages have been modified subsequent to being transmitted to the target virtual machine. The data structure also includes a first bit location index to identify the location of the first bit in the data structure that corresponds to a modified page. Bits in the data structure are updated in response to detecting that the corresponding pages have been modified subsequent to being transmitted to the target virtual machine. The data structure is scanned starting at the first bit location index to identify pages that have been modified subsequent to being transmitted to the target virtual machine. The identified pages are transmitted to the target virtual machine.
摘要:
Receiving an input authentication pattern, the input authentication pattern including non-alphanumeric input data. Determining if the input authentication pattern matches a previously stored authentication pattern. Providing access to a computing resource if the input authentication pattern matches the previously stored authentication pattern.