Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

366 results about "Daemon" patented technology

In multitasking computer operating systems, a daemon (/ˈdiːmən/ or /ˈdeɪmən/) is a computer program that runs as a background process, rather than being under the direct control of an interactive user. Traditionally, the process names of a daemon end with the letter d, for clarification that the process is in fact a daemon, and for differentiation between a daemon and a normal computer program. For example, syslogd is the daemon that implements the system logging facility, and sshd is a daemon that serves incoming SSH connections.

Data recovery using conversion of backup to virtual disk

A system includes a proxy processor configured to simulate a virtual disk, and a daemon processor in communication with the proxy processor and a backup repository. The proxy processor is configured to receive from an application a read request or a write request and to direct the read request or the write request to the daemon processor. The daemon processor is configured to receive the read request from the proxy processor and to access the backup repository or the simulated virtual disk, and to receive the write request from the proxy processor and to write data in the write request to the simulated virtual disk.
Owner:CA TECH INC

Failure detection and fault tolerance method and failure detection and fault tolerance system for real-time cloud platform

The invention relates to a failure detection and fault tolerance method and a failure detection and fault tolerance system for a real-time cloud platform. The system comprises a client used for sending a command, summiting a task and storing tasks assigned to working nodes in corresponding paths, a global state monitoring module used for monitoring the operation state of the working nodes, carrying out node-level failure detection and fault tolerance according to heartbeat information uploaded by the working nodes and performing migration of a task in a failure node, a global state storage module used for storing the working state and heartbeat information of the global state monitoring module and the working nodes, and working nodes used for performing a task, running a daemon process to guard a work process and performing program-level failure detection and fault tolerance. State information of a whole cluster is all stored in a Zookeeper system, a stateless architecture of the nodes is realized, a node failure does not cause state loss, the system has a perfect failure detection and fault tolerance mechanism, multilevel fault tolerance is realized, and uninterrupted operation of real-time services is guaranteed.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Memory Request/Grant Daemons in Virtual Nodes for Moving Subdivided Local Memory Space from VN to VN in Nodes of a Massively Parallel Computer System

A memory management mechanism a nodal having multiple processors in a massively parallel computer system dynamically configures nodal memory on demand. A respective variable-sized subdivision of nodal memory is associated with each processor in the node. A processor may request additional memory, and the other processor(s) may grant or veto the request. If granted, the requested memory is added to the subdivision of the requesting processor. A processor can only access memory within its own subdivision. Preferably, each subdivision contains a daemon which monitors memory usage and generates requests for additional memory.
Owner:INT BUSINESS MASCH CORP

Method for rapidly deploying extensible cluster

The invention relates to a method for rapidly deploying an extensible cluster. The method is implemented by using a modified DHCP server, a command line tool and a node daemon, wherein the modified DHCP server is responsible for distributing IP addresses and assigning TFTP server addresses for nodes to be deployed, intensively managing all nodes which are being deployed and are deployed successfully and preferentially selecting a node with the lightest load from the successfully deployed nodes while selecting a TFTP server; the command line tool can dynamically modify configuration information read in when the DHCP server starts so as to make use of hardware resources of the deployed nodes in a better way and perform a deploying process stably; the node daemon is downloaded from a main deployment server after the installation of a script in kickstart is completed, runs automatically and is responsible for reporting the state of the node daemon to the main deployment server, downloading a necessary file, starting TFTP and NFS services and the like. The method can adapt to the extension of cluster scale, achieves deployment effect which becomes more remarkable along with the extension of the cluster scale, has a flexible operation and controls an entire deployment process by configuring files or command lines.
Owner:SHANGHAI JUNESH INFORMATION TECH CO LTD

Hardware counter virtualization-based performance analysis method for multiple virtual machines

The invention discloses a hardware counter virtualization-based performance analysis method for multiple virtual machines. The method comprises the following steps of: when performance analysis is performed on multiple virtual machines at the same time and the multiple virtual machines need to occupy hardware counters, if the total number of central processing unit (CPU) events analyzed by multiple virtual machines surpasses the number of the hardware counters, virtualizing the hardware counters so as to meet requirements, otherwise, not virtualizing the hardware counters; and acquiring sampling information on the manager layer of an Xen virtual machine through a sampling mechanism, distributing the information to buffer zones which correspond to the virtual machines and analyzing and processing the information by using user layer programs of the virtual machines so as to obtain corresponding analysis result and detailed performance information. A request, which is used for starting or stopping performance analysis, of each virtual machine is monitored by a background daemon, Xenstore is taken as a message sending mechanism among the virtual machines, virtualization of the hardware counters is realized by time-sharing multiplexing technology, convenience is brought to program performance analysis in a virtual environment, and analysis accuracy is ensured well.
Owner:HUAZHONG UNIV OF SCI & TECH

Method and apparatus for platform independent network virtual memory (PINVM) hierarchy

A thin-client / server session is established using platform independent network virtual memory (PINVM). The server contains a collection of programs that are compiled for the client architecture. The client finds a server for PINVM. The server provides the client with the list of programs as well as the size of virtual memory space that will be allowed for the client to use. The client-side daemon process adjusts the available memory size so that the client OS thinks the memory size available is as large as the virtual memory size provided by the server during the session. The network virtual memory hierarchy is established, with the server's memory and hard disk attached to the client's physical memory hierarchy. After the client selects a program to launch, the server creates a virtual address space for the client program using the network memory hierarchy established. The program can now run on the client.
Owner:SYRACUSE UNIVERSITY

Method and Apparatus for Subdividing Local Memory in Nodes of a Massively Parallel Computer System

A memory management mechanism a nodal having multiple processors in a massively parallel computer system dynamically configures nodal memory on demand. A respective variable-sized subdivision of nodal memory is associated with each processor in the node. A processor may request additional memory, and the other processor(s) may grant or veto the request. If granted, the requested memory is added to the subdivision of the requesting processor. A processor can only access memory within its own subdivision. Preferably, each subdivision contains a daemon which monitors memory usage and generates requests for additional memory.
Owner:IBM CORP

Multi-person cooperative interaction and perception method in medical virtual reality training scene

The invention discloses a multi-person cooperative interaction and perception method in a medical virtual reality training scene, and belongs to the field of interaction and perception. The method comprises the steps of constructing a multi-person collaborative virtual environment composed of a plurality of clients and a server; when the operation of a certain client causes the change of the spacecoordinates and direction of an object, the client side generates a Socket sub-process; data format information is sent to a server frame by frame, after a daemon process of the server receives the information, the data is sent to other clients in a UDP broadcasting mode; after the other clients receive the data, the latest spatial position or state change of the object is synchronously updated frame by frame, and the collaborative perception function of all the clients is achieved. According to the method, multiple users with different medical roles are supported to cooperatively operate andperceive in the same virtual operation scene at the same time, so that when any user operates the virtual object, the state and continuity change of the virtual object can be synchronized to other users in real time, and then mutual perception among the multiple users is realized. The method is suitable for the field of medical virtual reality training.
Owner:SHANGHAI PNX INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products