摘要:
A system, method, computer program product, and program storage device for storing trace information of a program is disclosed. Upon entering or calling a subroutine, a memory buffer is created. Whenever a nested subroutine is called inside the subroutine, a subordinate memory buffer is created. Upon completion of a subroutine execution, a corresponding memory buffer is deleted. When encountering an event (e.g., an error, a defect, a failure, a warning) during execution, all data in currently existing memory buffers are transferred to a secondary memory storage device (e.g., a disk).
摘要:
A method, system, computer program product, and computer program storage device for performing a memory leak analysis inside a virtual machine is disclosed. By utilizing thread stack(s), class statics, and/or a list of root objects, a DFS algorithm starts execution at root objects in the thread stack(s), class statics, and/or a list of root objects. Upon fully processing an object, a reachability (sum of sizes of all child objects plus a size of the object itself) of the object is calculated. When the reachability of the object is larger than a threshold and when all reachabilities of children of the objects are less than another threshold (i.e., a largest child reachability of the object is less than another threshold), the object is determined as a potential source of a memory leak.
摘要:
Provided are a method, apparatus, and computer program product for testing a virtualized storage system. Data defining one or more configuration features of the virtualized storage system is received. Also received is a set of one or more predetermined rules defining interpretation of the disk exercising commands, the interpretation being dependent on one or more of the configuration features. A first disk exercising command is received. The first disk exercising command is interpreted in accordance with one of the predetermined rules to produce a second disk exercising command. The second disk exercising command is sent to the virtualized storage system.
摘要:
Provided are a method, apparatus, and computer program product for testing a virtualised storage system. Data defining one or more configuration features of the virtualised storage system is received. Also received is a set of one or more predetermined rules defining interpretation of the disk exercising commands, the interpretation being dependent on one or more of the configuration features. A first disk exercising command is received. The first disk exercising command is interpreted in accordance with one of the predetermined rules to produce a second disk exercising command. The second disk exercising command is sent to the virtualised storage system.
摘要:
A system, method, computer program product, and program storage device for storing trace information of a program is disclosed. Upon entering or calling a subroutine, a memory buffer is created. Whenever a nested subroutine is called inside the subroutine, a subordinate memory buffer is created. Upon completion of a subroutine execution, a corresponding memory buffer is deleted. When encountering an event (e.g., an error, a defect, a failure, a warning) during execution, all data in currently existing memory buffers are transferred to a secondary memory storage device (e.g., a disk).
摘要:
A computer system for fast format or reproducing data of a computer data storage device includes a computer system executing a reproducing process for reproducing data. A source disk (Ds) data storage device and a target disk (Dt) data storage device have data communication between each other and communicate with the computer system. The Ds data is reproducible to the Dt, and the Ds has blank regions with no data which corresponds to zero. The Ds having data regions and an intermediary flash copy map (D0) is generated by the program having all logical zeros for copying blank regions in the Ds to the Dt. The Ds is disengaged from reproducing after all data regions are copied from the Ds to the Dt. The reproducing of the Ds to the Dt continues after disengaging the Ds from the reproducing process by copying the zeros of the D0 to the Dt.
摘要:
A method, system, computer program product, and computer program storage device for performing a memory leak analysis inside a virtual machine is disclosed. By utilizing thread stack(s), class statics, and/or a list of root objects, a DFS algorithm starts execution at root objects in the thread stack(s), class statics, and/or a list of root objects. Upon fully processing an object, a reachability (sum of sizes of all child objects plus a size of the object itself) of the object is calculated. When the reachability of the object is larger than a threshold and when all reachabilities of children of the objects are less than another threshold (i.e., a largest child reachability of the object is less than another threshold), the object is determined as a potential source of a memory leak.
摘要:
A computer system for fast format or reproducing data of a computer data storage device includes a computer system executing a reproducing process for reproducing data. A source disk (Ds) data storage device and a target disk (Dt) data storage device have data communication between each other and communicate with the computer system. The Ds data is reproducible to the Dt, and the Ds has blank regions with no data which corresponds to zero. The Ds having data regions and an intermediary flash copy map (D0) is generated by the program having all logical zeros for copying blank regions in the Ds to the Dt. The Ds is disengaged from reproducing after all data regions are copied from the Ds to the Dt. The reproducing of the Ds to the Dt continues after disengaging the Ds from the reproducing process by copying the zeros of the D0 to the Dt.
摘要:
The present disclosure is a method for providing user-definitions of terms associated with a document. A method for providing user-definitions of terms may include providing a document, receiving text, receiving a request to define a term within the document, associating the user-provided definition of the term with the document, notifying the term includes the user-provided definition, receiving a request to view the user-provided definition, and displaying the definition to the remote user.