226 research outputs found

    JAVA INSTRUMENTATION OPTIMIZATION TECHNIQUES

    Get PDF
    Techniques are described herein for reducing overhead, risk, and code maintenance for Java® instrumentation required to monitor customer-facing applications. These techniques avoid transforms and retransforms, thereby eliminating risk and overhead as there are no transformers registered with the Java Virtual Machine (JVM). This may use the same call mechanism as a typical transform, and therefore requires no code changes in instrumentation. The dummy transform may always obtain a real class (not a null) that has not been initialized. Thus, a user may add a static block or other one-time-only objects. These techniques are also portable, because the only hook is in the core JVM classloader, and compact, because very little code is required for the agent itself

    APP-CENTRIC DISTRIBUTED MESSAGING BUS FOR PERFORMANCE MONITORING

    Get PDF
    A novel messaging system simplifies integration of dissimilar devices and instrumentation to enable a distributed application performance intelligence

    Precise Frequency Control of the Voltage Controlled Oscillator Using Finite Digital Word Lengths

    Get PDF
    For an oscillator that is periodically swept in frequency between some upper and lower bound, the output amplitude may easily be made constant and therefore known with a high degree of certainty. The instantaneous frequency exists only at a point in time and therefore possesses a zero probability of existing at any point. This thesis deals with the development of a method for interchanging the probability density functions of amplitude and frequency so that the latter becomes known with certainty while the former is known only to the extent that it is within a certain range. The method developed makes practical the use of the fast tuned voltage controlled oscillator as the local oscillator in a frequency scanning superheterodyne receiver. Exact frequency is expressed by a digital word of finite bit length that, in actuality, expresses the value of a quantized amplitude variable whose quantized value represents a precise frequency. Because of the interrelationship of amplitude, frequency, and time through the Fourier Transform, functions of these variables are also interrelated suggesting the possibility that the original certainty of amplitude information may be traded with the original uncertainty of frequency information. The success of the method presented makes use of the precise knowledge of the frequencies of the sidebands generated by the angle modulation process rather than make direct use of the instantaneous frequency. After mathematical development, a design example addresses the actual frequency range in the microwave region where the scanning superheterodyne receiver finds military application. To demonstrate the concept of precise frequency control with words of finite length, a practical frequency model is designed and constructed by scaling megahertz to hertz. Extensive use is made of monolithic waveform generators, balanced mixers, and operational amplifiers used as active filters and time domain summers. All assemblies within the model have practical microwave counterparts. Time and frequency domain waveforms are observed at virtually every major point of the model corresponding to the functional block interfaces and are compared with the mathematical predictions. The ultimate goal of precise frequency selection as a function of an imprecise independent variable is also obtained with the aid of a spectrum analyzer and dual trace oscilloscope. The causes of less than optimum signal level separation of adjacent discrete frequencies are analyzed in a qualitative manner. Reasons for the ineffectiveness of a quantitative critique are also presented. Experimental results, however, are demonstrated proof of the feasibility of the concept of exchanging probability density functions of related variables and that refinement is the only ingredient missing to render the fast scan VCO a useful local oscillator

    OPEN TELEMETRY LINE PROTOCOL (OTLP) INGESTION OF PROPRIETARY METRIC, LOG, AND TRACING SOURCES USING AND INTERIM COMMON EXPORT FORMAT (CSV)

    Get PDF
    Techniques are provided for a seamless and straight-forward method to export dissimilar network monitoring related metrics, events, logs, and traces from proprietary formats to a receivers operating in accordance with an industry standard format, such as an Open Telemetry format, receivers by converting such data to a native protocol format. OTLP is the de-facto protocol for sending OTEL MELT (Metrics Events Logs Traces) from an Agent or Collector to a backend OTEL receiver. Currently there are hundreds of proprietary protocols out there. There is a desire to convert such network monitoring related data to OTLP to take advantage of OTLP backend receivers

    WEB TOKEN BASED (JWT) DISTRIBUTION OF APPLICATION COMPONENT SOFTWARE BILL OF MATERIALS (SBOMS)

    Get PDF
    Techniques are provided for the integration of JSON Web Token (JWT) technology already present in most web applications to distribute SBOMs representing their web service downstream to other transaction components so they can be evaluated, reviewed, etc. for security and compliance assessment

    CORRELATION OF EXTENDED BERKELEY PACKET FILTER DATA, NETWORK FLOW, AND APPLICATION DATA TO ACHIEVE DEEPER INSIGHTS

    Get PDF
    Proposed herein are techniques to correlate together data derived from extended Berkeley Packet Filter (eBPF) visibility on hosts, combined with network data, such as that derived from monitored network traffic, and end host data, such as that derived from network visibility tools or other similar network monitoring tools/sources, in order to drive deeper visibility into traffic flows across network, and potential policy outcomes in mid-span network devices based on these correlations and the insights they provide

    PREVENTING DATA LEAKS FROM APPLICATION SCREEN-SHARING

    Get PDF
    According to a recent and comprehensive analysis of information security breaches, 23% of attacks are attributable to internal instances. Presented herein are techniques for protecting businesses against the sharing of confidential information within applications with unauthorized meeting participants. In particular, techniques presented herein restrict screen sharing of confidential information by preventing confidential content from being displayed on an unauthorized user’s endpoint device during a collaboration session
    • …
    corecore