Bert Vincent Laonipon - Raleigh NC, US Robbie John Minshall - Chapel Hill NC, US Carolyn Haibt Norton - Apex NC, US Srinvasan K. Rangaswamy - Morrisville NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30
US Classification:
707 8, 707202, 718105
Abstract:
A method in a data processing system for detecting and reducing database contention and deadlock caused from within an application server. A determination is made as to whether a set of parameters in a statistical model indicates contention. If the set of parameters in the statistical model indicates contention, an application server administrator is notified of the contention and the number of threads in an application server pool is reduced. If the set of parameters in the statistical model indicates contention is reduced, the number of threads in the application server pool is increased.
Software Memory Leak Analysis Using Memory Isolation
Matt Richard Hogstrom - Cary NC, US Robbie John Minshall - Chapel Hill NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G11C 29/00
US Classification:
714718
Abstract:
A computerized method, program product, and a service that allocates and isolates leaky memory during the execution of an application in a data processing system. A memory controller having several components first identifies a leaky section of memory and delegates to an allocation component to allocate more memory if possible. If, however, the problematic memory section should not be allocated more memory, an isolator component can isolate the memory section and further divide the memory section into subsections and so on. Each section and each subsection may then be tested to determine if more memory can be allocated, tested to determine if memory resources are strained so as to identify the application or its component causing the strain and then binding the memory. Each section and subsection and further divided and isolated until the leaky portion of memory is identified, and as a result, the software component causing the leak can also be identified. The software component associated with the leaky memory section or subsection can also be taken out-of-service.
Database Contention And Deadlock Detection And Reduction Within Application Servers
Bert Vincent Laonipon - Raleigh NC, US Robbie John Minshall - Chapel Hill NC, US Carolyn Haibt Norton - Apex NC, US Srinvasan K. Rangaswamy - Morrisville NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30
US Classification:
707688
Abstract:
A method in a data processing system for detecting and reducing database contention and deadlock caused from within an application server. A determination is made as to whether a set of parameters in a statistical model indicates contention. If the set of parameters in the statistical model indicates contention, an application server administrator is notified of the contention and the number of threads in an application server pool is reduced. If the set of parameters in the statistical model indicates contention is reduced, the number of threads in the application server pool is increased.
Software Memory Leak Analysis Using Memory Isolation
Matt R. Hogstrom - Cary NC, US Robbie J. Minshall - Chapel Hill NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G11C 29/00
US Classification:
714718
Abstract:
Detecting leaky memory during the execution of an application in a data processing system. A memory controller identifies a leaky section of memory and delegates to an allocation component to allocate more memory. An isolator component isolates the memory section and further divides the memory section into subsections. Each section and each subsection are tested to determine if memory resources are strained to identify an application or its component causing the strain. Each section and subsection are further divided and isolated until the leaky portion of memory is identified, and as a result, the software component causing the leak can also be identified.
Method, System, And Computer Program Product For Light Weight Memory Leak Detection
Robbie Minshall - Chapel Hill NC, US Ruth Willenborg - Apex NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/00
US Classification:
714038000
Abstract:
The present invention provides a method, system, and computer program product for light weight memory leak detection. A method in accordance with an embodiment of the present invention comprises: obtaining raw free memory statistics; approximating free memory after garbage collection from the raw free memory statistics; and analyzing the approximated free memory after garbage collection to identify a potential memory leak. A method in accordance with another embodiment of the present invention comprises the steps of: obtaining raw free memory statistics; generating a vector of memory leak indicators from the raw free memory statistics; comparing the vector of memory leak indicators against a plurality of vectors of the same memory leak indicators for known memory leak scenarios; and identifying a potential memory leak based on the comparison.
Method And System For Quantifying And Comparing Workload On An Application Server
A workload identifier program works in conjunction with an autonomic manager to calculate a workload representation during a pre-determined interval, calculate a similarity metric for the current workload representation by comparing the current workload representation to workload representations during the previous pre-determined intervals, comparing the similarity metric to a threshold value, and responsive to a determination that the similarity metric exceeds the threshold value, either: () issuing notifications to the autonomic manager so that the autonomic manager will ignore a plurality of data points and tune the application server with pre-determined recommendations designed for the dramatically increased workload (if the autonomic manager is a runtime autonomic manager), or () providing notification to the administrator about the dramatic increase in workload conditions by changing the color of the current interval (if the autonomic manager is a graphical autonomic manager).
Northfield Mt. Hermon School Northfield MA 1992-1996
Community:
Patrick Ricketts, Cynthia Kinast, Keith Spencer, Zennet Colburn, Susanna Nagel, Theresa Chen, David Flemming, Joseph Healy, Hellen Chen, Olivia Williamson