CN111880985A - Design of KX operating system - Google Patents

Design of KX operating system Download PDF

Info

Publication number
CN111880985A
CN111880985A CN202010606965.0A CN202010606965A CN111880985A CN 111880985 A CN111880985 A CN 111880985A CN 202010606965 A CN202010606965 A CN 202010606965A CN 111880985 A CN111880985 A CN 111880985A
Authority
CN
China
Prior art keywords
monitoring
operating system
configuration
kernel
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010606965.0A
Other languages
Chinese (zh)
Inventor
苗琼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202010606965.0A priority Critical patent/CN111880985A/en
Publication of CN111880985A publication Critical patent/CN111880985A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component, e.g. monitoring if the computing system is on, off, available, not available

Abstract

The invention discloses a design of a KX operating system, which is used for redesigning the KX operating system and is convenient for use, management and maintenance of the KX operating system. The invention discloses a design of a KX operating system, which comprises a system kernel for creating the KX operating system; the system kernel circularly executes the action instruction in the kernel memory to realize the data communication with the hardware system; creating a Unicorn module in a KX operating system, the Unicorn module processing results of the data communication; the method comprises the steps that a dynamic debugging tool is arranged in a KX operating system, the kernel memory is read and written through the dynamic debugging tool, a remote connection module is arranged in the KX operating system, and a client side is connected through the remote connection module, so that interaction between the client side and the Unicorn module is realized. The invention discloses a KX operating system which is designed by monitoring the KX operating system in real time through a system kernel, wherein a Unicorn module is arranged in the KX system to call and process system kernel data, and the KX operating system is monitored and managed.

Description

Design of KX operating system
Technical Field
The invention relates to the technical field of operating systems, in particular to a design of a KX operating system.
Background
The KX operating system is a proprietary operating system for high-end fault-tolerant computers/critical application hosts. Strong specialty is needed for resource monitoring, log analysis, firewall, network, disk, device driver configuration, management and maintenance of the KC operating system.
In the prior art, functions of calling resource monitoring of a KX operating system, log analysis, firewall, network, disk, device driver configuration and the like are often realized through professional operation, the operation is troublesome for people with less contact, the user can be familiar with the use of the KX operating system after long-time learning, the operation convenience of the KX operating system is poor, and the efficiency of resource monitoring, log analysis, firewall, network, disk, device driver configuration, management and maintenance of a hardware system running the KX operating system is low. The invention provides a design of a KX operating system aiming at the KX operating system, wherein a Unicorn module is configured in the KX system, the Unicorn module is a client functional module which is developed by using Unix, has low delay and high bandwidth and is connected, the management convenience of the KX operating system is improved, and the usability and maintainability of the system are greatly improved.
Disclosure of Invention
The invention provides a design of a KX operating system, and aims to solve the problems that the KX operating system in the prior art is inconvenient to manage and poor in usability.
To achieve the above object, the present invention provides a design of a KX operating system, including,
creating a system kernel of the KX operating system;
the system kernel circularly executes the action instruction in the kernel memory to realize the data communication with the hardware system;
creating a Unicorn module in a KX operating system, the Unicorn module processing results of the data communication;
the method comprises the steps that a dynamic debugging tool is arranged in a KX operating system, the kernel memory is read and written through the dynamic debugging tool, a remote connection module is arranged in the KX operating system, and a client side is connected through the remote connection module, so that interaction between the client side and the Unicorn module is realized.
Preferably, the Unicorn module includes a monitoring management module, a log analysis module and a configuration management module;
the monitoring management module comprises a monitoring configuration application and a monitoring item, and the monitoring configuration application configures the monitoring item;
the configuration management module comprises configuration items and the management application, and the management application processes the configuration items;
the log analysis module comprises a kernel log and a Unicorn log.
Preferably, the kernel memory stores an action instruction corresponding to the monitoring item, and the kernel memory stores an action instruction corresponding to the configuration item.
Preferably, the monitoring item obtains a result of data communication realized by executing the corresponding action instruction, the client sends a data packet to the monitoring configuration application to control the monitoring configuration application to configure the monitoring item, and the monitoring configuration application sends the result of data communication to the client for display;
or the configuration item acquires a data communication result realized by executing the corresponding action instruction, and imports the data communication result into the management application, the client sends a data packet to the management application to control the management application to process the data communication result, so as to generate an execution instruction of the hardware system and store the execution instruction into a hardware system memory, and the client sends the data packet to the hardware system to control the hardware system to execute the execution instruction stored in the hardware system memory.
Preferably, the log analysis module generates a kernel log according to the execution action instruction and the occurrence time of the execution action instruction of the system kernel, and the log analysis module generates a Unicorn log according to the monitoring item, the monitoring configuration application, the configuration item, the action of the management application, and the occurrence time of the action.
Preferably, the action instruction is formed by reading and writing the kernel memory through a dynamic debugging tool.
Preferably, the monitoring item includes monitoring CPU information, monitoring memory information, monitoring network I/O information, monitoring disk I/O information, monitoring file system information, monitoring sensor information, and monitoring process information; the action instruction corresponding to the monitoring item comprises an action instruction for acquiring CPU information, memory information, network I/O information, disk I/O information, file system information, sensor information and process information.
Preferably, the configuration items comprise a firewall, a network, a disk and a device driver; the action instruction corresponding to the configuration item comprises an action instruction for acquiring a firewall configuration file, a network configuration file, disk reading and writing and drive information.
Preferably, the management application comprises firewall configuration, network configuration, file management and device driver management; the firewall configuration processes a firewall configuration file, the network configuration processes the network configuration file, the file management reads and writes a disk through a file transfer protocol, and the device driver management updates a device driver.
The design of a KX operating system that this application provided specifically has following beneficial effect:
according to the design of the KX operating system, a system kernel of the KX operating system constructed in a kernel memory of a hardware system is used for circularly executing an action instruction, so that data communication is established between the system kernel and the hardware system, and real-time monitoring is carried out on hardware system resources; the Unicorn module configured in the KX operating system calls a result of the system kernel executing the action instruction by calling a function, and controls a management application in the Unicorn module to process the result in a local input mode to generate an operating instruction for controlling the hardware system; and the client can be connected with the Unicorn module through a remote login module network to call the configuration items of the monitoring items in the Unicorn module, and the management application is controlled to process the data of the configuration items in a client input mode, so that the KX operating system can be displayed to a user in a more intuitive mode, and a hardware system running the KX operating system can be conveniently and remotely monitored. The Unicorn module acquires Unicorn logs and kernel logs, the Unicorn logs and the kernel logs are called in a local operation mode or a client remote calling mode, the running state of a hardware system running the KX operating system is conveniently checked, the management convenience of the KX operating system is improved, and the usability and maintainability of the system are greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the structures shown in the drawings without creative efforts.
FIG. 1 is a schematic diagram of a design implementation process of a KX operating system in an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a Unicorn module of the KX operating system in an embodiment of the present invention;
FIG. 3 is a diagram illustrating a Unicorn module connecting clients in an embodiment of the present invention;
FIG. 4 is a diagram illustrating a system kernel and Unicorn module scheduling the system kernel according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating the connection establishment between the client and the KX os according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The main solution of the embodiment of the invention is as follows:
the invention provides a design of a KX operating system, which is applied to the KX operating system running in a hardware system.
Setting a fixed kernel memory in a memory of a hardware system, and creating a system kernel of a KX operating system in the kernel memory; and setting a dynamic debugging tool for reading and writing the kernel memory in the KX operating system, and editing and configuring the kernel memory through the dynamic debugging tool. And importing an action instruction for controlling a hardware system into the kernel memory, wherein the system kernel circularly executes the action instruction in the kernel memory to realize data communication with the hardware system. Referring to fig. 2, a Unicorn module is created in the KX operating system, and the Unicorn module processes the result of the data communication; and setting a remote connection module connected with a client in the KX operating system, remotely connecting the client through the remote connection module, and operating the hardware system provided with the KX operating system through the client.
The Unicorn module comprises a monitoring management module, a log analysis module and a configuration management module; the monitoring management module comprises a monitoring configuration application and a monitoring item, and the monitoring configuration application configures the monitoring item; the configuration management module comprises configuration items and the management application, and the management application processes the configuration items; the log analysis module comprises a kernel log and a Unicorn log. And storing an action instruction corresponding to the monitoring item in the kernel memory, and storing an action instruction corresponding to the configuration item in the kernel memory.
The monitoring item obtains a data communication result realized by executing the corresponding action instruction, the client sends a data packet to the monitoring configuration application to control the monitoring configuration application to configure the monitoring item, and the monitoring configuration application sends the data communication result to the client for display;
or the configuration item acquires a data communication result realized by executing the corresponding action instruction, and imports the data communication result into the management application, the client sends a data packet to the management application to control the management application to process the data communication result, so as to generate an execution instruction of the hardware system and store the execution instruction into a hardware system memory, and the client sends the data packet to the hardware system to control the hardware system to execute the execution instruction stored in the hardware system memory.
The design implementation process of the KX operating system shown in fig. 1 includes:
s100, creating a system kernel of a KX operating system;
s200, importing a compiled and configured action instruction into the system kernel;
s300, circularly executing the action instruction by the system kernel, and establishing data communication with a hardware system;
s400, a Unicorn module arranged in the KX operating system calls a result of executing the action instruction;
and S500, the Unicorn module processes the result of executing the action instruction.
In the specific implementation process, a fixed kernel memory is arranged in a memory of a hardware system, and an action instruction is stored in the kernel memory; in a specific implementation process, the action instruction includes an action instruction for acquiring CPU information, an action instruction for acquiring memory information, an action instruction for acquiring network I/O information, an action instruction for acquiring disk I/O information, an action instruction for acquiring file system information, an action instruction for acquiring sensor information in a hardware system, and an action instruction for acquiring process information, and the action instruction further includes an action instruction for acquiring a firewall configuration file, an action instruction for acquiring a network configuration file, an action instruction for reading and writing a disk, and an action instruction for acquiring drive information.
And the system kernel circularly executes the action instructions in the kernel memory to realize data communication with the hardware system.
In a specific implementation process, the data communication result of the action command is as follows: the data communication result of the action instruction for acquiring the CPU information includes the utilization rate of the CPU, the data communication result of the action instruction for acquiring the memory information includes the utilization rate of the memory, the data communication result of the action instruction for acquiring the network I/O information includes the bandwidth of the network, the data communication result of the action instruction for acquiring the disk I/O information includes the IOPS (Input/Output Per Second) of the disk, that is, the Input/Output amount (or the number of times of reading and writing) Per Second, the data communication result of the action instruction for acquiring the file system information includes the total directory space and the idle directory space, the data communication result of the action instruction for acquiring the sensor information in the hardware system is the sensor measurement data, and the data communication result of the action instruction for acquiring the process information includes the status of performing a name and occupying resources by the process. The data communication result of the action instruction of the firewall configuration file is acquired as a firewall configuration parameter list, the data communication result of the action instruction of the network configuration file is acquired as a network configuration parameter list, the communication result of the action instruction for reading and writing the disk is acquired as corresponding reading and writing of the disk, and the communication result of the action instruction for acquiring the drive information is a drive version number in the current hardware system.
And when the system kernel circularly executes the action instruction, continuously acquiring a new execution result, and for the same action instruction, the system kernel covers an old execution result according to the latest execution result in time sequence when the execution result of the action instruction is stored.
Referring to fig. 2 and fig. 3 in combination, a Unicorn module is created in the KX operating system, and is configured to monitor and control a hardware system running the KX operating system, and establish a connection with a client through a network service; in a specific implementation process, the Unicorn module comprises a monitoring management module, a log analysis module and a configuration management module;
the monitoring management module comprises a monitoring configuration application and a monitoring item, and the monitoring configuration application configures the monitoring item; the monitoring items comprise monitoring CPU information, monitoring memory information, monitoring network I/O information, monitoring disk I/O information, monitoring file system information, monitoring sensor information and monitoring process information; the monitoring method comprises the steps of monitoring CPU information to obtain the CPU utilization rate in a kernel memory, monitoring the memory utilization rate in the kernel memory, monitoring network I/O information to obtain the bandwidth of a network, monitoring disk I/O information to obtain the IOPS of a disk, monitoring file system information to obtain total directory space and idle directory space, monitoring sensor information to obtain sensor measurement data, and monitoring process information to obtain the conditions of names and processes occupying resources. And the monitoring configuration application configures and controls the display of the monitoring item on the client, so that the monitoring item is selectively displayed on different UI windows of the client.
The configuration management module comprises configuration items and the management application, and the management application processes the configuration items; in a specific implementation process, the configuration items comprise a firewall, a network, a disk and a device driver; the firewall acquires the firewall configuration parameter list, the network acquires the network configuration parameter list, the disk acquires read-write information of the disk, and the device driver acquires the drive version number of the hardware system. And controlling the firewall to configure the firewall configuration parameter list by means of local input of the KX operating system or input of a client, generating a corresponding firewall configuration file and a firewall configuration instruction for calling the firewall configuration file, wherein the firewall configuration file and the firewall configuration instruction are stored in a hardware system memory, and controlling the hardware system to execute the firewall configuration instruction by means of local input of the KX operating system or input of the client to complete firewall configuration. Controlling the network to configure the network configuration parameter list by the local input of the KX operating system or the input of a client, generating a corresponding network configuration file and a network configuration instruction for calling the network configuration file, wherein the network configuration file is stored in a memory of the hardware system in the network configuration instruction, and controlling the hardware system to execute the network configuration instruction by the local input of the KX operating system or the input of the client to complete network configuration. And controlling the hardware system to verify the configured network by the local input of the KX operating system or the input of a client, and controlling the hardware system to check the network fault by the local input of the KX operating system or the input of the client. And reading and writing the disk of the hardware system in a local operation mode of the KX operation system or reading and writing the disk of the hardware system by utilizing an NFS network file system or an FTP file transfer protocol in a client operation mode. And comparing the drive version number of the hardware system with the drive version number on the network by the local operation or client operation mode of the KX operation system, judging whether the version is the latest version, controlling the hardware system to drive through network downloading equipment by the local operation or client remote operation mode of the KX operation system, and installing.
The log analysis module comprises a kernel log and a Unicorn log. The log analysis module generates a kernel log according to the execution action instruction and the occurrence time of the execution action instruction of the system kernel, and the log analysis module generates a Unicorn log according to the monitoring item, the monitoring configuration application, the configuration item and the action and the occurrence time of the action of the management application.
Setting a dynamic debugging tool for reading and writing the kernel memory in the KX operating system, enumerating the kernel memory and action instructions stored in the kernel memory by the dynamic debugging tool, retrieving the kernel memory and the action instructions stored in the kernel memory by the dynamic debugging tool, modifying and compiling the action instructions in the kernel memory by the dynamic debugging tool or editing the action instructions to add the action instructions to the kernel memory by the dynamic debugging tool. The KX operating system provides a remote connection module that securely establishes a remote session between a client and a hardware system through SSH (secure shell protocol). The SSH provides password-based security authentication: and the remote session between the client and the hardware system is realized through the account number and the password. Providing key-based security authentication: a pair of keys is created and the public key is placed on the hardware system. And the client sends a request for security verification by using a secret key to the hardware system. And after receiving the request, the hardware system compares the secret key with the public key, and if the secret key is consistent with the public key, the hardware system encrypts a verification message through the public key and sends the verification message to the client. After receiving the verification message, the client decrypts the message locally by using the key and sends the message to the hardware system to complete login. In the connection process, the client sends a connection request to the remote login module, the remote login module receives the connection request and records and generates a connection request log, the remote login module judges whether the connection request log is legal or not, and if the connection request log is legal, connection between the client and a hardware system running the KX operating system is established.
And editing the kernel memory by locally running the dynamic debugging tool on the hardware system to generate the action instruction, and compiling and configuring the action instruction. Or remotely calling the dynamic debugging tool through the client to edit the kernel memory, generating the action instruction, and compiling and configuring the action instruction.
In a specific implementation, the hardware system may be a server.
According to the design of the KX operating system, a system kernel of the KX operating system constructed in a kernel memory of a hardware system is used for circularly executing an action instruction, so that data communication is established between the system kernel and the hardware system, and real-time monitoring is carried out on hardware system resources; the Unicorn module configured in the KX operating system calls a result of the system kernel executing the action instruction by calling a function, and controls a management application in the Unicorn module to process the result in a local input mode to generate an operating instruction for controlling the hardware system; and the client can be connected with the Unicorn module through a remote login module network to call the configuration items of the monitoring items in the Unicorn module, and the management application is controlled to process the data of the configuration items in a client input mode, so that the KX operating system can be displayed to a user in a more intuitive mode, and a hardware system running the KX operating system can be conveniently and remotely monitored. The Unicorn module acquires Unicorn logs and kernel logs, the Unicorn logs and the kernel logs are called in a local operation mode or a client remote calling mode, the running state of a hardware system running the KX operating system is conveniently checked, the management convenience of the KX operating system is improved, and the usability and maintainability of the system are greatly improved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that in the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (9)

1. A KX operating system is designed, which comprises,
creating a system kernel of the KX operating system;
the system kernel circularly executes the action instruction in the kernel memory to realize the data communication with the hardware system;
creating a Unicorn module in a KX operating system, the Unicorn module processing results of the data communication;
the method comprises the steps that a dynamic debugging tool is arranged in a KX operating system, the kernel memory is read and written through the dynamic debugging tool, a remote connection module is arranged in the KX operating system, and a client side is connected through the remote connection module, so that interaction between the client side and the Unicorn module is realized.
2. The design of the KX operating system according to claim 1, wherein the Unicorn modules include a monitoring management module, a log analysis module, and a configuration management module;
the monitoring management module comprises a monitoring configuration application and a monitoring item, and the monitoring configuration application configures the monitoring item;
the configuration management module comprises configuration items and the management application, and the management application processes the configuration items;
the log analysis module comprises a kernel log and a Unicorn log.
3. The KX operating system design according to claim 2, wherein the kernel memory stores action instructions corresponding to the monitoring items, and the kernel memory stores action instructions corresponding to the configuration items.
4. The KX operating system design according to claim 3, wherein the monitoring item obtains the result of data communication realized by executing the corresponding action command, the client sends a data packet to the monitoring configuration application to control the monitoring configuration application to configure the monitoring item, and the monitoring configuration application sends the result of data communication to the client for display;
or the configuration item acquires a data communication result realized by executing the corresponding action instruction, and imports the data communication result into the management application, the client sends a data packet to the management application to control the management application to process the data communication result, so as to generate an execution instruction of the hardware system and store the execution instruction into a hardware system memory, and the client sends the data packet to the hardware system to control the hardware system to execute the execution instruction stored in the hardware system memory.
5. The KX operating system design according to claim 4, wherein the log analysis module generates a kernel log according to the execution action command and the occurrence time of the execution action command of the system kernel, and the log analysis module generates a Unicorn log according to the action and the occurrence time of the action of the monitoring item, the monitoring configuration application, the configuration item, and the management application.
6. The KX operating system design according to claim 1, wherein the action command is formed by locally running or invoking and running the dynamic debugging tool by the client to read and write the kernel memory.
7. The design of the KX operating system according to claim 5, wherein the monitoring items include monitoring CPU information, monitoring memory information, monitoring network I/O information, monitoring disk I/O information, monitoring file system information, monitoring sensor information, and monitoring process information; the action instruction corresponding to the monitoring item comprises an action instruction for acquiring CPU information, memory information, network I/O information, disk I/O information, file system information, sensor information and process information.
8. The design of the KX operating system according to claim 5, wherein the configuration items include firewalls, networks, disks, and device drivers; the action instruction corresponding to the configuration item comprises an action instruction for acquiring a firewall configuration file, a network configuration file, disk reading and writing and drive information.
9. The KX operating system design according to claim 8, wherein the management applications include firewall configuration, network configuration, file management, device driver management; the firewall configuration processes a firewall configuration file, the network configuration processes the network configuration file, the file management reads and writes a disk through a file transfer protocol, and the device driver management updates a device driver.
CN202010606965.0A 2020-06-29 2020-06-29 Design of KX operating system Withdrawn CN111880985A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010606965.0A CN111880985A (en) 2020-06-29 2020-06-29 Design of KX operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010606965.0A CN111880985A (en) 2020-06-29 2020-06-29 Design of KX operating system

Publications (1)

Publication Number Publication Date
CN111880985A true CN111880985A (en) 2020-11-03

Family

ID=73158206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010606965.0A Withdrawn CN111880985A (en) 2020-06-29 2020-06-29 Design of KX operating system

Country Status (1)

Country Link
CN (1) CN111880985A (en)

Similar Documents

Publication Publication Date Title
US11307969B2 (en) Methods for improved web application testing using remote headless browsers and devices thereof
US10291686B2 (en) Managed peer-to-peer applications, systems and methods for distributed data access and storage
US7472193B2 (en) Expanded method and system for parallel operation and control of legacy computer clusters
JP5833725B2 (en) Control services for relational data management
US9191443B2 (en) Managed peer-to-peer applications, systems and methods for distributed data access and storage
US7587467B2 (en) Managed peer-to-peer applications, systems and methods for distributed data access and storage
US8688797B2 (en) Managed peer-to-peer applications, systems and methods for distributed data access and storage
US8793374B2 (en) Managed peer-to-peer applications, systems and methods for distributed data access and storage
JP5225094B2 (en) Method and system for resource virtualization health monitoring
US20050149481A1 (en) Managed peer-to-peer applications, systems and methods for distributed data access and storage
CN111625496B (en) Deployment method, device and equipment of distributed file system in virtual machine environment
US20220239735A1 (en) State management for device-driven management workflows
CN111625497B (en) Deployment method, device and equipment of distributed file system and storage medium
US10346618B1 (en) Data encryption for virtual workspaces
CN113626133B (en) Virtual machine control method, device, equipment and computer readable storage medium
CN108289074B (en) User account login method and device
US10180900B2 (en) Recordation of user interface events for script generation
JP2004102453A (en) Context launch management method and system, its program and recording medium
CN111880985A (en) Design of KX operating system
US20200301816A1 (en) Code profiling system and associated methods
CN111431951B (en) Data processing method, node equipment, system and storage medium
CN110808943B (en) Client connection emergency management method, client and computer readable storage medium
WO2019220480A1 (en) Monitoring device, monitoring method, and program
CN116614323B (en) Cloud storage enterprise network management method and system based on Rclone
CN110768855A (en) Method and device for testing linkmzation performance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20201103

WW01 Invention patent application withdrawn after publication