摘要:
Example implementations described herein include an innovative method for copying a first virtual machine accessing a primary volume in a hybrid cloud environment, the copy of the first virtual machine accessing a secondary volume in the hybrid cloud environment. The method may include creating the secondary volume. The method may further include creating an image of the first virtual machine and launching, from the image, the copy of the first virtual machine by (1) disabling a set of connection ports for connecting to the primary volume, (2) updating the set of connection ports for connecting to the secondary volume, and (3) enabling the set of connection ports.
摘要:
A method and system for using multiple versions of a software component, includes storing, in memory, a first function table that points to executable code in the memory for functions from a first version of the software component, and storing, in the memory, a second function table that points to executable code in the memory for functions from a second version of the software component, referencing the first function table, when running a first application thread, to execute the functions from the first version of the software component; and referencing the second function table, when running a second application thread that is active concurrently with the first application thread, to execute the functions from the second version of the software component.
摘要:
A method for verifying that software modules have a consistent code level is disclosed. In one embodiment, such a method includes updating a software product comprising a plurality of software modules. Upon updating the software product, the method updates a code-level table that documents an expected code level for each of the software modules. When a software module is called, the method determines an actual code level of the software module and compares the actual code level with the expected code level indicated in the code-level table. If the actual code level matches the expected code level, the method allows execution of the software module. If the actual code level does not match the expected code level, the method terminates execution of the software module. A corresponding system and computer program product are also disclosed.
摘要:
An operationally monolithic application is provided, where the application resides in a first program address space of an application server. The application calls to an application component residing in a second program address space of the application server, the application component being built upon a framework of the operationally monolithic application. The operationally monolithic application loads at least a first library upon which it depends to invoke a first method, and the application component loads at least a second library upon which it depends to invoke a second method. The first and second libraries can co-exist on the application server despite being different versions of the same libraries.
摘要:
A method for adapting execution of an application on a mobile device may be performed by a mobile device including a processor and a memory. The method may include receiving an application context, a process context, and one other context. The method also includes analyzing at least one of the application context or the process context together with the one other context. The method also includes dynamically adapting execution of the application on the mobile device based on the analysis. Adapting execution of the application may include transferring processing related to the application to a backend server for processing.
摘要:
Hardware transactional memory (HTM) systems may guarantee that transactions commit without falling back to non-speculative code paths. A transaction that fails to progress may enter a power mode, giving the transaction priority when it conflicts with non-power-mode transactions. If, during execution of a power-mode transaction, another thread attempts, using a non-power-mode transaction, to access a shared resource being accessed by the power-mode transaction, it may be determined whether any actual data conflict occurs between the two transactions. If no data conflict exists, both transactions may continue to completion. If, however, a data conflict does exist, the power-mode transaction may deny the other transaction access to the shared resource. HTM systems may, in some embodiments, ensure that only one power-mode transaction exists at a time. In other embodiments, multiple, concurrent, power-mode transactions may be supported while ensuring that they access disjoint data sets.
摘要:
A system for providing dynamic code deployment and versioning is provided. The system may be configured to receive a first request to execute a newer program code on a virtual compute system, determine, based on the first request, that the newer program code is a newer version of an older program code loaded onto an existing container on a virtual machine instance on the virtual compute system, initiate a download of the newer program code onto a second container on the same virtual machine instance, and causing the first request to be processed with the older program code in the existing container.
摘要:
A computing device identifies a load instruction and store instruction pair that causes a load-hit-store conflict. A processor tags a first load instruction that instructs the processor to load a first data set from memory. The processor stores an address at which the first load instruction is located in memory in a special purpose register. The processor determines where the first load instruction has a load-hit-store conflict with a first store instruction. If the processor determines the first load instruction has a load-hit store conflict with the first store instruction, the processor stores an address at which the first data set is located in memory in a second special purpose register, tags the first data set being stored by the first store instruction, stores an address at which the first store instruction is located in memory in a third special purpose register and increases a conflict counter.
摘要:
A software package to be installed on a host system may be received. Services of the host system that are associated with the software package may be identified. Furthermore, a determination may be made if at least one service associated with the software package are currently used by at least one virtual machine associated with the host system. If at least one service is currently used by at least one virtual machine then a notification may be provided.
摘要:
Disclosed are “graphics overrides.” An override accepts a stream of graphics commands as produced by an application and then modifies the stream before it is rendered by the GPU. Different overrides perform different modifications. One override can modify a stream of graphics commands in response to another stream. Overrides can enforce conformity with a visual paradigm and, by being modified, can support a change to that paradigm without requiring the applications to change. Overrides can monitor the entire computing environment and improve the response to that environment of a particular application: For example, an override monitors frames as they are produced by an application. If the application cannot keep up with a fixed frame rate, then the override produces “synthetic” frames to take the place of missing frames. Overrides are not restricted to fixing existing problems. Rather, applications can be developed that depend upon the presence of overrides.