Edward Alan Addison - Raleigh NC, US Tracy Michael Canada - Fuquay Varina NC, US Michael Vann - Raleigh NC, US
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 12/14
US Classification:
711163
Abstract:
A method for automatically detecting an attempted invalid access to a memory address in accordance with an exemplary embodiment is provided. The method includes reading a first data set having a software application name and a memory address stored therein utilizing the mainframe computer. The memory address indicates a portion of a memory that is not allowed to be changed. The method further includes detecting when a software application is attempting to access the memory address and setting a first bit in the memory to a first value in response to the detection utilizing the mainframe computer. The method further includes storing a name of the software application, the memory address, and contents of the portion of the memory specified by the memory address, in a second data set, when the first bit has the first value utilizing the mainframe computer. The method further includes displaying an error message on a display device when the first bit has the first value.
Edward A. Addison - Raleigh NC, US Peggy A. DeVal - Raleigh NC, US Philip R. Lee - Hampshire, GB Andrew Wright - Hampshire, GB
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 9/44
US Classification:
717131
Abstract:
Identifying conflicting declared invalid runtime references of overlaid data structures of a shared memory area as declared in a program listing. The identifying includes identifying a first data structure and a first parameter list in the program listing. A first routine call and a sequential flow of execution of the first routine call through the program listing in order to write data to the shared memory area are identified. A second data structure and a second parameter list in the program listing are identified. A second routine call and a second sequential flow of execution of the second routine call through the program listing in order to write data to the shared memory area are identified. It is determined whether the second routine call is attempting to overwrite data of the first routine call with the data of the second routine call in the shared memory area.
Diagnostic Data Capture In A Computing Environment
Edward A. Addison - Raleigh NC, US Philip R. Lee - Winchester, GB Roger G. Lewis - Southampton, GB Andrew Wright - Eastleigh, GB
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 11/07
US Classification:
714 45, 714E11025
Abstract:
A multithreaded computing environment for capturing diagnostic data includes initiating a trap delay component having a delay threshold in response to a monitor determining that the computing environment is in a predetermined invalid state. The multithreaded computing environment for capturing diagnostic data also includes recording, by a first thread, diagnostic data for the computing environment. The trap delay component delays the step of recording diagnostic data until the monitor determines that the predetermined invalid state has been repeated for at least one of a total count or a period corresponding to a predetermined indicator that it is a state other than a transient state of the computing environment. The transient state corresponds to a transition of the computing environment by one or more other threads from a first valid state to a second valid state.
Automated Performance Data Management And Collection
Edward A. Addison - Raleigh NC, US Peggy A. DeVal - Raleigh NC, US Philip R. Lee - Winchester, GB Andrew Wright - Eastleigh, GB
Assignee:
INTERNATIONAL BUSINESS MACHINES CORPORATION - Armonk NY
International Classification:
G06F 15/00
US Classification:
702186
Abstract:
Performance data for a healthy system is captured and used to create benchmarks that represent behavior of the computing environment in a healthy state. Current behavior (e.g, run-time characteristics) of the computing environment are monitored in an on-going manner, and are compared to the benchmarks. When a benchmark is violated, performance data capture is dynamically and automatically enabled. Or, if performance data is already being captured, then performance data capture may be enabled for a larger subset of possible data. Optionally, performance data capture may be automatically disabled upon detecting that the current behavior of the computing environment has returned to a healthy state where benchmarks are no longer violated.
Janga was working with fellow Delaware State University science grad Edward Addison at the universitys new genomics lab on Kirkwood Highway near Prices Corner. They performed about six steps that included heating the samples and running them through a whirring centrifuge before they determined whet
Date: Feb 08, 2021
Category: More news
Source: Google
Googleplus
Edward Addison
Education:
Houston Community College System - Computer Science