-
公开(公告)号:US10860377B2
公开(公告)日:2020-12-08
申请号:US15466072
申请日:2017-03-22
Applicant: salesforce.com, inc.
Inventor: Brian Toal
Abstract: Systems, methods, and computer-readable media for identifying and managing memory allocation for one or more threads are described. A computer system may detect that a threshold memory utilization has been met, and may determine an aggregate memory allocation for a thread. The aggregate memory allocation may be a difference between a first memory allocation for the thread at a first time that the threshold memory utilization was met and a second memory allocation for the thread at a second time that the threshold memory utilization was met. The computer device may provide an indication that the thread has met or exceeded a threshold memory allocation when the aggregate memory allocation is greater than or equal to the threshold memory allocation. The computer device may disable the thread when the aggregate memory allocation is greater than or equal to the threshold memory allocation. Other embodiments may be described and/or claimed.
-
公开(公告)号:US11734058B2
公开(公告)日:2023-08-22
申请号:US17081048
申请日:2020-10-27
Applicant: salesforce.com, inc.
Inventor: Brian Toal , Sankar Rao Bhogi
CPC classification number: G06F9/4862 , G06F9/5027 , G06F9/542 , G06F11/0772 , H04L67/02
Abstract: Systems and method are provided for receiving, at a virtualized management operation engine (VMOE) of a distributed system, a management task request from a client for one or more services. The management task request may be to an orchestrator of a first application server of one or more application servers of the distributed system. The first application server having the orchestrator may determine whether the management task request is valid. The first application server having the orchestrator may generate a request message based on the valid management task request. A message bus may broadcast the generated request message to one or more agents of the one or more application servers of the distributed system. The one or more agents may execute an operation based on the request message when the request message is intended for the one or more agents.
-
公开(公告)号:US11082519B2
公开(公告)日:2021-08-03
申请号:US15589444
申请日:2017-05-08
Applicant: salesforce.com, inc.
Inventor: Brian Toal , Paymon Teyer
Abstract: A computer-implemented method of providing content using a request-response protocol is provided. The method comprises storing a data object associated with a key, receiving a first response message from a server containing an invalidate parameter wherein the invalidate parameter includes a pattern that matches the key, and invalidating the stored data object associated with the key in response to the invalidate parameter. A computing system comprising one or more processors and non-transitory computer readable storage medium embodying programming instructions configurable to cause the one or more processors to implement a proxy cache is also provided. The proxy cache is configured to store a data object associated with a key, receive a first response message from a server containing an invalidate parameter wherein the invalidate parameter includes a pattern that matches the key, and invalidate the stored data object associated with the key in response to the invalidate parameter.
-
公开(公告)号:US11327952B2
公开(公告)日:2022-05-10
申请号:US16563204
申请日:2019-09-06
Applicant: Salesforce.com, Inc.
Inventor: Ajay Krishna Borra , Gokulakrishnan Gopalakrishnan , Manpreet Singh , Brian Toal , Laksh Venka , Metarya Ruparel
Abstract: A metric data stream for a plurality of metrics may be retrieved from a database system. Each metric may measure a respective computing characteristic. The metric data stream may include a plurality of values for each of a sequence of time intervals. Each value may correspond with a respective one of the metrics. A plurality of metric correlation matrices may be determined for the metrics, each of which is associated with a respective time period in the metric data stream. A subset of comparison metric correlation matrices may be selected from the plurality of metric correlation metric matrices. A designated anomaly score may be determined for a designated time period by comparing a designated metric correlation matrix associated with the designated time period with the selected subset of comparison metric correlation metric matrices.
-
公开(公告)号:US20220129304A1
公开(公告)日:2022-04-28
申请号:US17081048
申请日:2020-10-27
Applicant: salesforce.com, inc.
Inventor: Brian Toal , Sankar Rao Bhogi
Abstract: Systems and method are provided for receiving, at a virtualized management operation engine (VMOE) of a distributed system, a management task request from a client for one or more services. The management task request may be to an orchestrator of a first application server of one or more application servers of the distributed system. The first application server having the orchestrator may determine whether the management task request is valid. The first application server having the orchestrator may generate a request message based on the valid management task request. A message bus may broadcast the generated request message to one or more agents of the one or more application servers of the distributed system. The one or more agents may execute an operation based on the request message when the request message is intended for the one or more agents.
-
公开(公告)号:US20210143991A1
公开(公告)日:2021-05-13
申请号:US16677572
申请日:2019-11-07
Applicant: salesforce.com, inc.
Inventor: Brian Toal , Prasad Peddada
Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for securing memory dumps. In response to a trigger condition, a server generates a symmetric key corresponding to an instance of a memory dump. The server encrypts memory contents of the server using the symmetric key. In addition, the server encrypts the symmetric key using a key-encrypting key (kek), which can include a public key Both the encrypted memory contents and the encrypted symmetric key are stored for the instance of the memory dump. Responsive to a request for information pertaining to the instance of the memory dump, the encrypted memory contents and the encrypted symmetric key are retrieved from storage, the encrypted symmetric key is decrypted using a private key, and the symmetric key is used to decrypt the encrypted memory contents.
-
公开(公告)号:US10922095B2
公开(公告)日:2021-02-16
申请号:US16384699
申请日:2019-04-15
Applicant: salesforce.com, inc.
Inventor: Brian Toal , Laksh Venka
Abstract: Embodiments of the present disclosure relate to software application performance regression analysis. Other embodiments may be described and/or claimed.
-
公开(公告)号:US11431481B2
公开(公告)日:2022-08-30
申请号:US16677572
申请日:2019-11-07
Applicant: salesforce.com, inc.
Inventor: Brian Toal , Prasad Peddada
Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for securing memory dumps. In response to a trigger condition, a server generates a symmetric key corresponding to an instance of a memory dump. The server encrypts memory contents of the server using the symmetric key. In addition, the server encrypts the symmetric key using a key-encrypting key (kek), which can include a public key Both the encrypted memory contents and the encrypted symmetric key are stored for the instance of the memory dump. Responsive to a request for information pertaining to the instance of the memory dump, the encrypted memory contents and the encrypted symmetric key are retrieved from storage, the encrypted symmetric key is decrypted using a private key, and the symmetric key is used to decrypt the encrypted memory contents.
-
公开(公告)号:US11194591B2
公开(公告)日:2021-12-07
申请号:US16255752
申请日:2019-01-23
Applicant: salesforce.com, inc.
Inventor: Brian Toal , Rahul Shinde
Abstract: Embodiments of the present disclosure relate to loading software resources for execution by a software application. Other embodiments may be described and/or claimed.
-
10.
公开(公告)号:US10802944B2
公开(公告)日:2020-10-13
申请号:US16255741
申请日:2019-01-23
Applicant: salesforce.com, inc.
Inventor: Brian Toal , Dean Tupper
IPC: G06F9/44 , G06F11/36 , G06F16/953
Abstract: Embodiments of the present disclosure relate to dynamically maintaining alarm thresholds for software application performance management. Other embodiments may be described and/or claimed.
-
-
-
-
-
-
-
-
-