226 research outputs found
JAVA INSTRUMENTATION OPTIMIZATION TECHNIQUES
Techniques are described herein for reducing overhead, risk, and code maintenance for Java® instrumentation required to monitor customer-facing applications. These techniques avoid transforms and retransforms, thereby eliminating risk and overhead as there are no transformers registered with the Java Virtual Machine (JVM). This may use the same call mechanism as a typical transform, and therefore requires no code changes in instrumentation. The dummy transform may always obtain a real class (not a null) that has not been initialized. Thus, a user may add a static block or other one-time-only objects. These techniques are also portable, because the only hook is in the core JVM classloader, and compact, because very little code is required for the agent itself
APP-CENTRIC DISTRIBUTED MESSAGING BUS FOR PERFORMANCE MONITORING
A novel messaging system simplifies integration of dissimilar devices and instrumentation to enable a distributed application performance intelligence
Precise Frequency Control of the Voltage Controlled Oscillator Using Finite Digital Word Lengths
For an oscillator that is periodically swept in frequency between some upper and lower bound, the output amplitude may easily be made constant and therefore known with a high degree of certainty. The instantaneous frequency exists only at a point in time and therefore possesses a zero probability of existing at any point. This thesis deals with the development of a method for interchanging the probability density functions of amplitude and frequency so that the latter becomes known with certainty while the former is known only to the extent that it is within a certain range.
The method developed makes practical the use of the fast tuned voltage controlled oscillator as the local oscillator in a frequency scanning superheterodyne receiver. Exact frequency is expressed by a digital word of finite bit length that, in actuality, expresses the value of a quantized amplitude variable whose quantized value represents a precise frequency. Because of the interrelationship of amplitude, frequency, and time through the Fourier Transform, functions of these variables are also interrelated suggesting the possibility that the original certainty of amplitude information may be traded with the original uncertainty of frequency information. The success of the method presented makes use of the precise knowledge of the frequencies of the sidebands generated by the angle modulation process rather than make direct use of the instantaneous frequency.
After mathematical development, a design example addresses the actual frequency range in the microwave region where the scanning superheterodyne receiver finds military application. To demonstrate the concept of precise frequency control with words of finite length, a practical frequency model is designed and constructed by scaling megahertz to hertz. Extensive use is made of monolithic waveform generators, balanced mixers, and operational amplifiers used as active filters and time domain summers. All assemblies within the model have practical microwave counterparts.
Time and frequency domain waveforms are observed at virtually every major point of the model corresponding to the functional block interfaces and are compared with the mathematical predictions. The ultimate goal of precise frequency selection as a function of an imprecise independent variable is also obtained with the aid of a spectrum analyzer and dual trace oscilloscope.
The causes of less than optimum signal level separation of adjacent discrete frequencies are analyzed in a qualitative manner. Reasons for the ineffectiveness of a quantitative critique are also presented. Experimental results, however, are demonstrated proof of the feasibility of the concept of exchanging probability density functions of related variables and that refinement is the only ingredient missing to render the fast scan VCO a useful local oscillator
OPEN TELEMETRY LINE PROTOCOL (OTLP) INGESTION OF PROPRIETARY METRIC, LOG, AND TRACING SOURCES USING AND INTERIM COMMON EXPORT FORMAT (CSV)
Techniques are provided for a seamless and straight-forward method to export dissimilar network monitoring related metrics, events, logs, and traces from proprietary formats to a receivers operating in accordance with an industry standard format, such as an Open Telemetry format, receivers by converting such data to a native protocol format. OTLP is the de-facto protocol for sending OTEL MELT (Metrics Events Logs Traces) from an Agent or Collector to a backend OTEL receiver. Currently there are hundreds of proprietary protocols out there. There is a desire to convert such network monitoring related data to OTLP to take advantage of OTLP backend receivers
WEB TOKEN BASED (JWT) DISTRIBUTION OF APPLICATION COMPONENT SOFTWARE BILL OF MATERIALS (SBOMS)
Techniques are provided for the integration of JSON Web Token (JWT) technology already present in most web applications to distribute SBOMs representing their web service downstream to other transaction components so they can be evaluated, reviewed, etc. for security and compliance assessment
CORRELATION OF EXTENDED BERKELEY PACKET FILTER DATA, NETWORK FLOW, AND APPLICATION DATA TO ACHIEVE DEEPER INSIGHTS
Proposed herein are techniques to correlate together data derived from extended Berkeley Packet Filter (eBPF) visibility on hosts, combined with network data, such as that derived from monitored network traffic, and end host data, such as that derived from network visibility tools or other similar network monitoring tools/sources, in order to drive deeper visibility into traffic flows across network, and potential policy outcomes in mid-span network devices based on these correlations and the insights they provide
The design and construction of an in-pile irradiation sample and associated instrumentation for the simulation of very high flux neutron irradiation effects on semi-conductor material.
http://www.archive.org/details/designconstructi00hul
PREVENTING DATA LEAKS FROM APPLICATION SCREEN-SHARING
According to a recent and comprehensive analysis of information security breaches, 23% of attacks are attributable to internal instances. Presented herein are techniques for protecting businesses against the sharing of confidential information within applications with unauthorized meeting participants. In particular, techniques presented herein restrict screen sharing of confidential information by preventing confidential content from being displayed on an unauthorized user’s endpoint device during a collaboration session
Recommended from our members
Cytogenetic and Array-CGH Characterization of a Complex de novo Rearrangement Involving Duplication and Deletion of 9p and Clinical Findings in a 4-Month-Old Female
Approximately 15 patients with partial trisomy 9p involving de novo duplications have been previously described. Here, we present clinical, cytogenetic, FISH and aCGH findings in a patient with a de novo complex rearrangement in the short arm of chromosome 9 involving an inverted duplication at 9p24→p21.3 and a deletion at 9pter→p24.2. FISH probes generated from BACs selected from the UCSC genome browser were utilized to verify this rearrangement. It is likely that some previously described duplications of 9p may also be products of complex chromosomal aberrations. This report in which FISH and aCGH were used to more comprehensively characterize the genomic rearrangement in a patient with clinical manifestations of 9p duplication syndrome underscores the importance of further characterizing cytogenetically detected rearrangements
Recommended from our members
Human Folliculin Delays Cell Cycle Progression through Late S and G2/M-Phases: Effect of Phosphorylation and Tumor Associated Mutations
The Birt-Hogg-Dube disease occurs as a result of germline mutations in the human Folliculin gene (FLCN), and is characterized by clinical features including fibrofolliculomas, lung cysts and multifocal renal neoplasia. Clinical and genetic evidence suggest that FLCN acts as a tumor suppressor gene. The human cell line UOK257, derived from the renal cell carcinoma of a patient with a germline mutation in the FLCN gene, harbors a truncated version of the FLCN protein. Reconstitution of the wild type FLCN protein into UOK257 cells delays cell cycle progression, due to a slower progression through the late S and G2/M-phases. Similarly, Flcn–/– mouse embryonic fibroblasts progress more rapidly through the cell cycle than wild type controls (Flcnflox/flox). The reintroduction of tumor-associated FLCN mutants (FLCN ΔF157, FLCN 1–469 or FLCN K508R) fails to delay cell cycle progression in UOK257 cells. Additionally, FLCN phosphorylation (on Serines 62 and 73) fluctuates throughout the cell cycle and peaks during the G2/M phase in cells treated with nocodazole. In keeping with this observation, the reintroduction of a FLCN phosphomimetic mutant into the UOK257 cell line results in faster progression through the cell cycle compared to those expressing the wild type FLCN protein. These findings suggest that the tumor suppression function of FLCN may be linked to its impact on the cell cycle and that FLCN phosphorylation is important for this activity. Additionally, these observations describe a novel in vitro assay for testing the functional significance of FLCN mutations and/or genetic polymorphisms
- …