Processes are monitored as components are loaded into memory. Relocation of a component to an alternate base address instead of its preferred base address, causes an alternate component to be created corresponding to the relocated component. The alternate component is a copy of the relocated component, but the preferred base address of the alternate component is reset to be the alternate base address of the relocated component. Additional alternate components may be created for each relocated component, with each additional alternate component being optimized in a different manner. Alternate components may be implemented as alternate data stream of the corresponding relocated components. In response to subsequent requests to load a selected component into memory, it is determined whether the selected component has at least one corresponding alternate component. If so, one of the corresponding alternate components is loaded into memory instead of the selected component.
Systems And Methods For Avoiding Base Address Collisions
Processes are monitored as components are loaded into memory. Relocation of a component to an alternate base address instead of its preferred base address, causes an alternate component to be created corresponding to the relocated component. The alternate component is a copy of the relocated component, but the preferred base address of the alternate component is reset to be the alternate base address of the relocated component. Additional alternate components may be created for each relocated component, with each additional alternate component being optimized in a different manner. Alternate components may be implemented as alternate data stream of the corresponding relocated components. In response to subsequent requests to load a selected component into memory, it is determined whether the selected component has at least one corresponding alternate component. If so, one of the corresponding alternate components is loaded into memory instead of the selected component.
System And Methods For Avoiding Base Address Collisions
Processes are monitored as components are loaded into memory. Relocation of a component to an alternate base address instead of its preferred base address, causes an alternate component to be created corresponding to the relocated component. The alternate component is a copy of the relocated component, but the preferred base address of the alternate component is reset to be the alternate base address of the relocated component. Additional alternate components may be created for each relocated component, with each additional alternate component being optimized in a different manner. Alternate components may be implemented as alternate data stream of the corresponding relocated components. In response to subsequent requests to load a selected component into memory, it is determined whether the selected component has at least one corresponding alternate component. If so, one of the corresponding alternate components is loaded into memory instead of the selected component.
Dynamically Setting The Optimal Base Addresses Of Process Components
Processes are monitored to determine if all of their components are loaded from persistent storage into memory at their preferred base addresses. Each of the components is examined to determine if that component's in-memory base address matches the preferred base address of its on-disk representation. If a base address collision is detected, the on-disk representation of the preferred base address is updated to reflect the new in-memory base address.
An application program includes an executable file and at least one other component (e.g. a DLL). A copy of the executable file is created and its import address table is modified by replacing a reference to the component with a reference to a delay-load component and replacing a reference to an imported function included within the component with a reference to a delay-load function included within the delay-load component. The delay-load function is designed to load the component into memory upon execution of a function call designed to access the imported function. The copy of the executable file may be saved as an alternate data stream of the original executable file. The copy of the executable file may be loaded into memory in response to a command for initializing the application program. As a result, the delay-load component will be loaded into memory instead of the component.
The present systems and methods generally relate to the elimination or reduction of network traffic required to support operations on a file of any size stored remotely on a file server or network share. More particularly, the present systems and methods relate to encapsulation of a remote file in such a way that the file appears to the local operating system and any local applications to be residing locally, thus overcoming some of the performance issues associated with multiple users accessing a single network share (e.g., CIF S share) and/or a single user remotely accessing a large file.
Remote Application Access In A Virtual Desktop Infrastructure Environment
- Suwanee GA, US Kevin GOODMAN - Alpharetta GA, US
International Classification:
G06F 9/451 G06F 9/455 G06F 16/188
Abstract:
Technologies are disclosed for providing remote application access in a virtual desktop infrastructure (“VDI”) environment. Application and OS files may be encapsulated in VHDs in such a way that the files appear to an OS and applications to be stored on a local mass storage device. A filter driver may monitor registry activity, detect I/O requests or instructions directed to paths at a local computing system, and redirect the detected I/O requests or instructions to an attached VHD. This allows for a computing system to access an application encapsulated within a remote VHD as if the application was stored locally. In this way, the computing device may access and use applications in a virtual computing environment without the need to package/sequence the applications.
Redirection Of I/O Requests From Local To Remote Storage Locations To Improve Network Performance And Data Redundancy
- Redmond WA, US Kevin John GOODMAN - Alpharetta GA, US
International Classification:
G06F 3/06 G06F 16/182 H04L 29/08
Abstract:
Technologies are disclosed for redirecting input/output (“I/O”) requests to virtual hard disks (“VHDs”) to improve network performance and data redundancy. More particularly, files can be encapsulated in remote VHDs and accessed in such a way that the files appear to a local operating system and any local applications to be residing locally. Furthermore, I/O requests redirected to files encapsulated in VHDs may also be redirected to one or more additional VHDs for data redundancy. The redirected I/O requests may be transmitted simultaneously but separately to the additional VHDs in a split stream.
General Civil and Trial Practice Personal Injury Law Wrongful Death Law Defective Products Law Medical Malpractice Business Law Real Estate Law Discrimination Law Harassment Law Employment Litigation International Business Transactions Estate Planning Law Adoption Law Family Law Bankruptcy Law
ISLN:
906990009
Admitted:
1989
University:
University of Utah, B.A., 1985
Law School:
McGeorge School of Law, University of the Pacific, J.D., 1988
"It's an infrastructure legacy,'' said Kevin Goodman, managing director and a partner in BlueBridge Networks, which has a downtown data center near Playhouse Square and a larger facility in suburban Mayfield Heights.
Date: Aug 31, 2014
Category: Sci/Tech
Source: Google
Flickr
Googleplus
Kevin Goodman
Kevin Goodman
Tagline:
Hi, I'm Kevin.
Kevin Goodman
Kevin Goodman
Kevin Goodman
Kevin Goodman
Kevin Goodman
Kevin Goodman
Youtube
#NoUmBow Kevin Goodman & The Flaming Arrows P...
Pay-View Link Available NOW... Link below today...
Duration:
34s
Big Chief Kevin Goodman & the Flaming Arrows ...
Duration:
24s
Funeral of Flaming Arrows Queen Shirley Goodman
After the funeral, family and friends joined in Indian chanting and a ...
Duration:
8m 48s
Big Chief Kevin Goodman - Letter from the Porch
Big Chief Kevin Goodman with Flaming Arrows Mardi Gras Indian Tribe Me...
Duration:
18m 19s
Big Chief Kevin Goodman's Birthday Party / In...
Flaming Arrows members are joined by other Indians to celebrate Goodma...
Duration:
2m
Flaming Arrows Big Chief Goodman Mardi Gras 2...
WWOZ was on hand as Big Chief Kevin Goodman first appeared to his trib...