WO2015138586A1 - Systems and methods for data synchronization and failover management - Google Patents

Systems and methods for data synchronization and failover management Download PDF

Info

Publication number
WO2015138586A1
WO2015138586A1 PCT/US2015/019920 US2015019920W WO2015138586A1 WO 2015138586 A1 WO2015138586 A1 WO 2015138586A1 US 2015019920 W US2015019920 W US 2015019920W WO 2015138586 A1 WO2015138586 A1 WO 2015138586A1
Authority
WO
WIPO (PCT)
Prior art keywords
instance
instances
application
primary
results
Prior art date
Application number
PCT/US2015/019920
Other languages
French (fr)
Inventor
James Michael CAPE
Robert Park
Allen Zhang
Zoran PERKOV
Lieting YU
Prerak Pukhraj SANGHVI
Beau TATEYAMA
Constantine Sokoloff
Eric QUINLAN
Original Assignee
Iex Group, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iex Group, Inc. filed Critical Iex Group, Inc.
Priority to ES15761173T priority Critical patent/ES2776366T3/en
Priority to AU2015229434A priority patent/AU2015229434B2/en
Priority to EP15761173.2A priority patent/EP3117308B1/en
Priority to CA2942359A priority patent/CA2942359C/en
Priority to KR1020207034291A priority patent/KR102250617B1/en
Priority to BR112016021037-9A priority patent/BR112016021037B1/en
Priority to KR1020167027986A priority patent/KR102250613B1/en
Priority to SG11201607515XA priority patent/SG11201607515XA/en
Priority to JP2016556727A priority patent/JP6592450B2/en
Priority claimed from US14/644,674 external-priority patent/US10210005B2/en
Publication of WO2015138586A1 publication Critical patent/WO2015138586A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0793Remedial or corrective actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/44Encoding
    • G06F8/443Optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44536Selecting among different versions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45504Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators

Definitions

  • This disclosure generally relates to runtime environments for execution of software applications and, in particular, to techniques for enhancing performance and reliability of a software application.
  • Software programs and systems generally referred to as software applications or applications, often perform mission critical tasks in various fields such as monitoring and control of medical systems, financial transactions, monitoring and control of industrial manufacturing, etc.
  • An application performing a critical task fails sometimes, e.g., due to a software error. Via code analysis, testing, and repairs to the code, software errors can be avoided or at least minimized.
  • the execution of a software application fails not due to a software error but due to an event in the environment in which the application is executed. For example, a disk or another memory from which the application accesses data may fail, a network link for accessing one or more components of the application and/or required data may fail, etc. Such environmental failures can cause a software application to fail.
  • a software application is expected not only to deliver high performance, e.g., to generate required computational results as quickly as possible, but also to provide these results in a reliable manner. While software errors can be avoided or at least minimized, as described above, errors caused by environmental factors and/or hardware failures tend to be unpredictable.
  • One way to improve reliability of the software application therefore, is to execute simultaneously two instances of the software application. Even if one instance fails due to an environmental event, it is not very likely that at or about that moment of time an event would occur in the environment of the other instance, causing that instance to fail, as well. Therefore, the other instance, often called as a backup instance, may continue to perform the required computational tasks.
  • interpreted computer languages offer several benefits over their compiled counterparts, such as greater portability across different computer architectures.
  • Running code in an interpreter can be dramatically slower, however, than running the same code compiled to a processor's native machine language.
  • many interpreters can improve performance by including just-in- time (JIT) compilation, in which at least a portion of the interpreter's bytecode is compiled to the processor's native code. The interpreter can then execute the native code instead of interpreting the bytecode for that portion of the program.
  • JIT just-in- time
  • This feature is provided in several interpreter runtimes, including the standard HotSpot implementation of the Java Virtual Machine (JVM) and Microsoft's Common Language Runtime (commonly known as .NET), and may offer performance comparable to traditional ahead-of-time (AIT) compiled languages.
  • JVM Java Virtual Machine
  • .NET Common Language Runtime
  • Embodiments of systems and methods described herein feature Data
  • Synchronization and Failover Management through which the reliability of a software application can be increased by facilitating simultaneous execution of several non-identical instances of the software application. While this can increase the cost of execution of the software application, unlike techniques based merely on redundancy, the non-identical instances can provide a performance enhancement.
  • each instance can be generated to optimize a different respective goal such as maximizing, minimizing, or utilizing according to a specified limit one or more resources such as memory, network interfaces, processing capacity, number of available processors, etc.
  • Some instances may be optimized for execution using runtime information available from previous runs and/or by using just-in-time (JIT) compilation. Such instances can be generated by compiling the source code of the software application using different compilers and/or by using different compiler options that can optimize one or more specified goals, such as those described above.
  • each instance produces, in substance, the same results as any other instance, i.e., each instance is likely to produce the same results the software application is expected to produce.
  • Different instances may be optimized differently, however, and, hence, may output one or more results in a sequence of results at different times during their respective execution, even though the execution of the various instances of the software application is initiated at or about the same time.
  • an implementation of a DSFM system can designate/label a corresponding output from an instance that produced the output before all other instances as the required result and may discard the outputs from other instances as duplicates.
  • different instances may first output different results. By designating/labelling the earliest produced respective outputs as the successive results of the software application, an implementation of the DSFM system can improve the overall performance of the software application.
  • each instance performs all of the computations that are required to generate that result.
  • These instances can be in different states because some instances, due to different respective optimizations thereof, may have performed additional computations that are not required to produce the particular result. Nevertheless, when all instances have completed the computations that are required to produce a particular result, an implementation of DSFM system considers these instances to be in synchronization or in sync.
  • An implementation of DSFM system may designate/label one of these instances as a primary instance.
  • one implementation of DSFM system may designate/label the outputs of the primary instance as the results of the software application, and may discard the outputs of the one or more other instances, designated/labelled as secondary instance(s).
  • the primary instance fails after k results are produced, collectively by all of the instances, as described above, or by the primary instance alone, an implementation of DSFM system can designate/label one of the secondary instances as a new primary instance because, as described above, all of these instances are in sync, though not in an identical state, after the k results are produced.
  • the (k+l)-th and one or more subsequent results may be produced by the secondary instance re-designated/re-labelled as the new primary instance.
  • implementation of DSFM system may re-designate/re-label that other secondary instance as the new primary instance. While the cost of executing a software application would generally increase with the number of instances, the different instances, due to different respective optimizations thereof, may have different performances associated with the production of different results, and the selection of the earliest output can increase the overall performance of the software application. Even though the various instances are non-identical, several implementations of a DSFM system can determine the instants at which the various instances are in sync, and can thus enable failover from one instance to another different instance, likely in a different state than that of the failed instance, without affecting the results produced, and can thus increase reliability of the software application.
  • a method for executing a software application expeditiously on at least one computer processor.
  • the method includes
  • the method includes monitoring, corresponding to the result, a respective output generated by each instance.
  • the method also includes labelling from the monitored outputs the output that occurs earliest as the output of the application corresponding to the result, and labelling all other outputs as duplicates. In this way, each one of the first set of results is obtained from an instance that produced that particular result before all other instances, thereby speeding up a computing performance of the one or more computer processors in executing the software application.
  • the several instances include a first instance and a second instance
  • the compiler option for the first instance includes ahead-of-time (AIT) compilation.
  • AIT ahead-of-time
  • the compiler option for the second instance may include just-in-time (JIT) compilation. JIT compilation of the second instance may be based on, at least in part, runtime information obtained from one or more prior executions of the second instance. At least a portion of source code of the software application may be specified using a programming language that is at least partially interpreted.
  • the several instances include a first instance
  • the compiler option for the first instance can be one or more of unconstrained memory usage, minimization of memory usage, maximization of concurrent operations, and constrained concurrency of operations.
  • the first instance may maximize parallel computation taking advantage of unconstrained memory usage.
  • the first instance can minimize the memory usage, etc.
  • the method further includes labelling one instance from the several instances as a primary instance, and labelling all other instances as secondary instances.
  • the method may also include, for each result from a second plurality of results to be produced by the application, suppressing, corresponding to the result, respective outputs from the secondary instances.
  • the method may also include identifying a failure of the primary instance after producing k results from the second plurality of results, where k > 1.
  • the primary instance may then be labelled a failed instance.
  • the method may further include selecting a secondary instance that executed logic associated with computation of each of the k results, and re-labelling the selected secondary instances as the primary instance, whereby the re-labelled primary instance produces (k+l)-th result.
  • the selected secondary instance executed logic associated with the computation of each of the k results, the selected secondary instance is likely in sync with the primary instance prior to failure thereof. Therefore, the execution of the application via two or more instances can failover from one instance to another, generally without introducing substantial delays (such as those associated with restarting an application) and/or errors.
  • a method for enabling failover for a software application.
  • the method includes monitoring by a processor-based controller simultaneous executions of a primary instance of the software application and a first secondary instance of the application.
  • the primary instance is compiled according to a first compiler option
  • the first secondary instance is compiled according to a compiler option that is different from the first compiler option.
  • the method also includes detecting a failure of the primary instance after production of k results of the software application, where k > 1.
  • the method includes confirming that the first secondary instance has computed operations required to compute the k- th result, and labelling the first secondary instance as the primary instance.
  • the controller may suppress outputs of the first secondary instance that correspond to the k results, i.e., prior to failure of the instance labelled as the primary instance.
  • the first compiler option may include just-in-time (JIT) compilation, and the compiler option used for the first secondary instance may include ahead-of-time (AIT) compilation.
  • the method further includes monitoring by the controller simultaneous execution of a second secondary instance of the application.
  • the second secondary instance is compiled according to a compiler option that is different from both the first compiler option and the compiler option used to compile the first secondary instance. If the first secondary instance is not confirmed by the method to have computed the operations required to compute the k-th result, the method may include confirming that the second secondary instance has the computed operations required to compute the k-th result. The second secondary instance may then be labelled as the primary instance, permitting efficient and error free failover from the instance previously labelled as the primary instance to the second secondary instance, which is re-labelled as the primary instance.
  • a system for executing a software application expeditiously on at least one computer processor includes a first processor and a first memory in electrical communication with the first processor.
  • the first memory includes instructions which, when executed by a processing unit that may include the first processor and/or a second processor, program the processing unit to simultaneously execute several instances of the software application on one or more computer processors. Each instance is compiled according to a respective compiler option that is different from respective compiler options used to compile all other instances from the several instances.
  • the instructions program the processing unit to monitor, corresponding to the result, a respective output generated by each instance.
  • the instructions also program the processing unit to label from the monitored outputs the output that occurs earliest as the output of the application
  • each one of the first set of results is obtained from an instance that produced that particular result before all other instances, thereby speeding up a computing performance of the one or more computer processors in executing the software application.
  • the instructions can program the processing unit to perform one or more of the method steps described above.
  • a system for enabling failover for a software application includes a first processor and a first memory in electrical communication with the first processor.
  • the first memory includes instructions which, when executed by a processing unit that may include the first processor and/or a second processor, program the processing unit to monitor simultaneous executions of a primary instance of the software application and a first secondary instance of the application.
  • the primary instance is compiled according to a first compiler option
  • the first secondary instance is compiled according to a compiler option that is different from the first compiler option.
  • the instructions also program the processing unit to detect a failure of the primary instance after production of k results of the software application, where k > 1.
  • the instructions program the processing unit to confirm that the first secondary instance has computed operations required to compute the k-th result, and to label the first secondary instance as the primary instance.
  • the execution of the application via two or more instances can failover from one instance to another, generally without introducing substantial delays (such as those associated with restarting an application) and/or errors.
  • the instructions can program the processing unit to perform one or more of the method steps described above.
  • an article of manufacture that includes a non-transitory storage medium has stored therein instructions which, when executed by a processing unit program the processing unit, which is in electronic communication with a memory, to simultaneously execute several instances of the software application on one or more computer processors. Each instance is compiled according to a respective compiler option that is different from respective compiler options used to compile all other instances from the several instances. For each one of a first set of results to be produced by the application, the instructions program the processing unit to monitor, corresponding to the result, a respective output generated by each instance.
  • the instructions For each one of the first set of results to be produced by the application, the instructions also program the processing unit to label from the monitored outputs the output that occurs earliest as the output of the application corresponding to the result, and to label all other outputs as duplicates.
  • the instructions can program the processing unit to perform one or more of the method steps described above.
  • an article of manufacture that includes a non-transitory storage medium has stored therein instructions which, when executed by a processing unit program the processing unit, which is in electronic communication with a memory, to monitor simultaneous executions of a primary instance of the software application and a first secondary instance of the application.
  • the primary instance is compiled according to a first compiler option
  • the first secondary instance is compiled according to a compiler option that is different from the first compiler option.
  • the instructions also program the processing unit to detect a failure of the primary instance after production of k results of the software application, where k > 1.
  • the instructions program the processing unit to confirm that the first secondary instance has computed operations required to compute the k-th result, and to label the first secondary instance as the primary instance.
  • the instructions can program the processing unit to perform one or more of the method steps described above.
  • One technical effect of various embodiments of the present invention is that the overall performance of a software application that is expected to produce a sequence of results can be increased by selecting for each result the earliest output from several instances simultaneously producing outputs corresponding to that result.
  • the times at which the different instances may produce outputs corresponding to a particular result may be different due to differences in the manner in which the different instances are compiled. Some instances may initially produce outputs slower than some other instances, but may later produce outputs faster than those instances.
  • the software application is executed through the instances that were the fastest in producing outputs respectively corresponding to different results, thereby speeding up execution of the overall software application.
  • Another technical effect of various embodiments of the present invention is that while increasing performance as described above, the different instances can be maintained in synchronization, though not in the exact same state, at the computation of each one of a series of results to be produced by the software application. Therefore, if one instances fails after the production of one or more results, another instance, likely the fastest in producing the next result among those that have not failed, can be used to produce the next result. Thus, a safe, i.e., generally error free failover can be achieved without having to incur excessive delays, such as those associated with restarting the application, while enhancing the overall performance of the software application.
  • FIGURE 1 illustrates the uses of various embodiments of a DSFM system
  • FIGURE 2 depicts a datagraph diagram illustrating failover from a primary instance of a software application to a secondary instance, using an embodiment of a DSFM system
  • FIGURE 3 depicts a logic flow diagram illustrating a transition from one instance of a software application to another instance, using an embodiment of a DSFM system
  • FIGURES 4 and 5 schematically illustrate performance enhancement of a software application using an embodiment of a DSFM system; and [0031 ] FIGURE 6 schematically depicts a DSFM controller, according to one embodiment.
  • a Data Synchronization and Failover Management (DSFM) system 102 can execute two instances of the software application, one designated/labelled as a primary instance and another one designated/labelled as a secondary instance.
  • the primary instance may fail, e.g., due to hardware failure, networking error, etc., and execution may be transferred to the secondary instance (also called a backup instance).
  • the secondary instance may not be in the same exact state as the primary one, for example, because even though the primary and the secondary instances are derived from identical source code, the two instances may be compiled differently. Therefore, the secondary instance may not follow the same code path as that of the primary instance.
  • the execution of the secondary instance can be different compared to that of the primary instance, resulting in, for example, different and/or potentially subpar results, e.g., in terms of execution speed.
  • the primary and secondary instances even if they were in identical states at the start, may drift apart during execution, and even when they are in sync, i.e., generally implementing the same overall logic, the two instances may not be in exactly the same state.
  • a just-in-time (JIT) compilation can translate a bytecode code into a machine code, while searching for an optimal code path to follow during execution. If JIT compilation is used to generate either the primary or the secondary instance, but not both, at a particular time the primary and secondary instances may not execute exactly the same instructions.
  • JIT just-in-time
  • One instance (denoted Instance A) of this code segment may first evaluate the condition, then determine if the condition is true, and may then compute f 1 or £2 accordingly, to produce the result x.
  • the same compiler or another compiler may have knowledge that evaluation of the condition usually takes a long time (e.g., a few milliseconds), and the evaluation of fl and £2 also takes some time (e.g., a few milliseconds), but that all three computations are not dependent on each other. Therefore, another instance (denoted Instance B) of the same code segment, compiled using the knowledge about execution times, using the other compiler or a different option of the same compiler, may compute both fl and £2 while the evaluation of the condition is ongoing. After the evaluation is completed, Instance B may readily choose between the results of fl and £2, thereby producing the output faster than Instance A would. Thus, at a particular moment in time, Instance A of the code segment may be evaluating the condition only, while Instance B may be additionally computing fl and £2, as well.
  • Instance C of the code segment may have knowledge that more often than not, the condition is false. Therefore, Instance C may compute £2 only and not fl, while the evaluation of the condition is underway, and compute fl only if the condition is determined to be true. Thus, the computation of x can be speeded up relative to that by Instance A, which was compiled without using any additional knowledge, in a majority of situations but not in all of them. At a particular moment in time Instance A may be evaluating the condition only, while Instance C may be evaluating both the condition and f2. Thus, even though, instances A, B, and C generally implement the same logic that is specified by the code segment, at a particular moment of time, each of these instances may execute different instructions.
  • the one or more instances generally lagging in the production of results of the application relative to another instance may be configured to suppress their respective outputs, e.g., to avoid duplication of results.
  • the primary instance e.g., Instance B
  • the secondary instance e.g., Instances A or C
  • the instances A and C may not produce a duplicate of that output, even when the computations required to produce that output are performed by the instances A and C.
  • the instance designated/labelled to produce outputs thereof as results of the application may be called a primary instance (e.g., Instance B), and the one or more other instances (e.g., Instance A and Instance C) may be called secondary instance(s).
  • the secondary instance(s) perform the operations associated with each result to be produced by the application and by suppressing only the outputs of the secondary instance(s)
  • the secondary instance(s) are maintained in sync with the primary instance and in a state as close to the state of the primary as possible.
  • the JIT compilation for the primary and secondary instances may generate different code paths with different instructions for the primary and secondary instances, as described above using the example code segment.
  • the primary and secondary instances may have different code paths because different kinds of compilers (e.g., JIT and ahead-of-time (AIT)) are used to compile the primary and secondary instances.
  • the same compiler may be used to compile both the primary instance and the secondary instance, but different compiler options may be used during respective compilations.
  • compiler options include, but are not limited to, minimizing memory usage, unconstrained memory usage, maximizing concurrent and/or partially overlapping operations (e.g., using parallel processors, several threads, etc.), limiting the number of concurrent and/or partially overlapping operations to a specified limit, etc.
  • a primary instance is detected to have failed and the execution is switched to a secondary instance.
  • the secondary instance execution may follow a different code path and, hence, the performance and efficiency of the secondary instance may not match that of the primary instance, e.g., 104.
  • Various embodiments of a DSFM system describe herein can take advantage of an option in some JIT runtimes using which the entire program may be compiled ahead of time.
  • the -Xcomp command-line option can cause the runtime to compile every executed method immediately rather than subjecting the method to the relatively slower interpretation and profiling phases.
  • the NGen utility can compile bytecode programs to native code at the time of installation rather than doing so every time the program is run. While these options may differ in their operation, they both generally have the same effect of transforming JIT into ahead-of-time compilation.
  • two instances of a single bytecode program are executed simultaneously. Simultaneously generally means with at least a partial overlap in the respective times of execution.
  • the first instance uses the optional ahead-of-time compilation while the second is run by the standard adaptive JIT runtime. Both instances are supplied with identical inputs and they may produce identical outputs, but at different speeds.
  • initially the first instance is significantly faster as it uses compiled code while the second instance continues to profile the code in the interpreter.
  • the second instance gradually compiles the program, its performance typically increases and eventually may surpass the performance of the first instance, in part due to the greater optimization available with the adaptive JIT compiler.
  • the different executions of the two instances can be represented as a single execution of a software application.
  • the respective outputs of the two instances may be merged via a filter process.
  • the filter process collects the output messages from the two instances, but only issues an output message in response to the first or earlier produced of the merged messages, i.e., a message produced by a faster instance, and the duplicate messages produced by the other relatively slower instance are discarded.
  • the filter can effectively issue messages from the faster one of the two instances.
  • the combination of the two instances and the filter operates as a single instance with both the faster initial performance of ahead-of-time compilation and the faster long-term performance of adaptive JIT. This technique can be extended to more than two instances, for example, as described below with reference to FIGS. 4 and 5.
  • users/clients 201 may request to execute an application by, for example, running a piece of code on a given system, e.g., 205.
  • a given system e.g., 205.
  • the backup application uses the same code path as the primary instance. But, in some embodiments, some steps in the executions may be slightly different.
  • a primary instance and a secondary instance may follow the exact same code path except for the primary instance generating an output after the execution, e.g., 207, while the secondary does not, e.g., 208.
  • the output generation processing by the backup application may run through the full execution path of the primary instance up to but not including the point of publishing the output, resulting in primary and secondary instances that are kept as identically close to each other as possible.
  • the primary and the secondary instances may not end up in an exactly identical state, however.
  • execution requests 206a to the primary instance may specify that a final output needs to be produced.
  • execution requests 206a and 206b may be (Secure) Hypertext Transfer Protocol ("HTTP(S)") POST messages including a "write output” instruction in the form of data formatted according to the XML.
  • HTTP(S) Hypertext Transfer Protocol
  • JIT just-in-time
  • the JIT compiler may initiate the optimization of the codes as part of the compilation, whether it is the primary, e.g., 207, or the secondary, e.g., 208.
  • JIT compilation may consolidate duplicative code lines into succinct ones, and/or remove extraneous code paths to more efficiently optimize the paths that are being most used. For example, if a code path has been used more than a predetermined and/or dynamically determined threshold number of times, in some embodiments, it may be given a higher priority and favored over other code paths with less usage.
  • the secondary instance that may run through the full execution path of the primary instance up to the point of publishing the output may have a code path that is not the same as that of the primary instance, because the code of the secondary instance leading up to the point of publishing may not be optimized similarly as the corresponding code of the primary instance.
  • the secondary and/or standby application may become a primary instance when the original primary and/or active application is determined to have failed.
  • a server 204 may monitor the performance of the primary instance and initiate application failover when it detects system and/or application failure on the part of the original primary instance, e.g., 209.
  • the server may designate/label a secondary instance of the application into a new primary instance and direct the codes for execution to the newly primary instance, e.g., 210.
  • the secondary server 204 may generate a (Secure) Hypertext Transfer Protocol ("HTTP(S)”) POST message including a switch instruction in the form of data formatted according to the XML.
  • HTTP(S) Secure Hypertext Transfer Protocol
  • code execution may then be directed to the application with the optimal code path where the "publish" or “write” code of the application is cold, i.e., not optimized, e.g., 211.
  • code execution request 211 may be a (Secure) Hypertext Transfer Protocol ("HTTP(S)") POST message including a "write output” instruction in the form of data formatted according to the XML as described above with reference to FIGURE 2.
  • HTTP(S) Hypertext Transfer Protocol
  • the performance of the code execution may be inferior compared to the previously primary one, as some parts of the code path are not optimized.
  • java may run through the predetermined and/or dynamically determined threshold number of iterations of the "write" code of the code path to optimize, i.e., "warm up” the code path, and in the process slow the application down for the duration of the warm up period, resulting in degradation in performance compared to the primary instance before the switch e.g., 212.
  • the DSFM system may allow the secondary and/or standby applications to execute to the end of the full code path including the publishing of the message outputs of the codes.
  • this allows the primary and the secondary instances to maintain identical states, and in the event of failure with the primary instance, the secondary instance may step in and proceed with the code execution along the same optimized code path as the previously primary instance would have taken and hence without degradation in performance, e.g., 213.
  • the secondary instance may allow the message processing path to execute to the end of the java segment and have java write the message output to the next step, but then stop the path before the next step begins.
  • the full java path may be executed by both the primary and the backup
  • the secondary instance may pick up immediately where the primary instance left off with no degradation in performance since the secondary instance is both optimized by java and "warmed up" like the primary instance.
  • FIGURE 3 shows a logic flow diagram illustrating examples of transforming a request for application execution via an embodiment of a DSFM component into an optimized and efficient execution of the application.
  • a user may wish to execute an application, e.g., 301, and initiate the execution by running a piece of code of the application. In some implementations, this may be the first instance of the running of the code, and the compiling of the code may be warranted, e.g., 302.
  • a java source code translated into a bytecode may be compiled by a JIT compiler into a machine code, e.g., 303.
  • the compilation may be done dynamically and/or it may be done to just a piece of the full code (e.g., to the method of the code that was called, etc.).
  • java may start monitoring the running of the code to optimize the execution, e.g., 305. For example, java may wait for a few number of iterations before identifying methods, functions, etc., that are frequently called and/or used as the "hot spots", e.g., 306.
  • the hot spots may be singled out for further optimization, e.g., 309.
  • these methods, functions, etc. may be made more efficient by consolidating commands, discarding code elements, etc., to improve efficiency and speed in executing the application.
  • java may also wait for a number of iterations before identifying code paths that are frequently used, e.g., 307, and optimize/"prime" the application for improved efficiency by removing extraneous code paths that are infrequently used, e.g., 310. For example, after a path has been executed 10,000 times, it may receive higher priority, while other paths that are infrequently used may be discarded in favor of the higher priority path.
  • the execution of the application may become more efficient, e.g., 311.
  • FIGURE 4 shows block diagrams illustrating an exemplary DSFM system providing application optimization, synchronization and failover by virtue of a redundancy of application processes.
  • the DSFM system may initiate the execution of at least two instances of the application, e.g., 401a-n (equivalently two or more identical applications). In some embodiments, there may not be any status designation/labelling of these instances of the applications as primary and
  • each application instance may execute independently to produce identical or nearly identical message outputs that are written to a messaging bus/wire 406.
  • minor variations in systems processing e.g., software, hardware, etc.
  • a sequencer may process the arriving messages and classify one output as the message output of the application and the rest as duplicates.
  • a sequencer 403 may designate/label one message output written to the wire by one of two or more instances of an application as the message output of the application to be kept, and label (and consequently, for example, discard) the rest of the message outputs coming from the slower instances of the applications as duplicates.
  • the sequencer may utilize the time of arrival of the messages as the criteria for choosing which messages to keep and which messages to label as duplicates. For example, the sequencer may pick the first message to be written to the wire as the message output of the application and discard the rest, e.g., 404.
  • the sequencer may utilize other criteria instead of or in combination with the time of arrival to determine the message that should be kept as the message output of the application.
  • the criteria may include the time of arrival of the message, the size of the message, etc.
  • the sequencer may employ the criterion that the message that is kept as the output of the application is the first message that arrives whose size is less than some threshold number of bytes in size (and/or the smallest in size, etc).
  • the messages that are retained by the sequencer may come from different applications, as which application "wins out” in writing out a message varies message-by-message.
  • the final message output of executing applications may be pieced together by the sequencer from the message outputs of the multiple identical or nearly identical applications.
  • application D's message may be the first to arrive out of a first batch of N messages, e.g., 501.
  • another application's (say application K's) message may be the first to arrive at the sequencer, e.g., 502.
  • the sequencer 504 may piece together the message from application D in the first batch, followed by the message from application K in the second batch, etc., to arrive at the final message output of the application, e.g., 505.
  • the redundancy may cause message traffic on the messaging bus/wire. For example, with N identical or nearly identical applications running, there would be N identical or nearly identical message outputs, resulting in increased message traffic for the wire. Conversely, the redundancy may be utilized for performance optimization as the system reaps the benefit of obtaining message outputs from the fastest applications as described above. In some
  • the redundancy may provide a fail safe mechanism in cases where one or more applications fail, e.g., 405. In such implementations, there may not be a need to manually and/or automatically intervene, as there is one or more other applications executing, and message outputs may be obtained from these one or more applications, e.g., 406.
  • various embodiments described herein can increasing performance of code in interpreted and/or other languages, e.g., with optional just-in-time (JIT) compiled runtimes.
  • JIT just-in-time
  • Adaptive JIT compilers can increase long-term performance compared to ahead-of-time and/or simple JIT compilers, at the cost of a period of slower initial performance while the code is interpreted and profiled to enhance the later compilation phase.
  • the benefits of optimized JIT compilation without sacrificing initial performance during the interpreted phase can be achieved.
  • FIGURE 6 shows a block diagram illustrating examples of a DSFM controller
  • the DSFM controller 601 may serve to aggregate, process, store, search, serve, identify, instruct, generate, match, and/or facilitate interactions with a computer through various technologies, and/or other related data.
  • Users may engage information technology systems (e.g., computers) to facilitate information processing.
  • computers employ processors to process information; such processors 603 may be referred to as central processing units (CPU).
  • processors 603 may be referred to as central processing units (CPU).
  • CPUs One form of processor is referred to as a microprocessor.
  • CPUs use communicative circuits to pass binary encoded signals acting as instructions to enable various operations. These instructions may be operational and/or data instructions containing and/or referencing other instructions and data in various processor accessible and operable areas of memory 629 (e.g., registers, cache memory, random access memory, etc.).
  • memory 629 e.g., registers, cache memory, random access memory, etc.
  • communicative instructions may be stored and/or transmitted in batches (e.g., batches of instructions) as programs and/or data components to facilitate desired operations.
  • batches e.g., batches of instructions
  • These stored instruction codes, e.g., programs, may engage the CPU circuit components and other
  • One type of program is a computer operating system, which, may be executed by CPU on a computer; the operating system enables and facilitates users to access and operate computer information technology and resources.
  • Some resources that may be employed in information technology systems include: input and output (I/O) mechanisms through which data may pass into and out of a computer; memory storage into which data may be saved; and processors by which information may be processed.
  • I/O input and output
  • These information technology systems may be used to collect data for later retrieval, analysis, and manipulation, which may be facilitated through a database program.
  • These information technology systems provide interfaces that allow users to access and operate various system components.
  • the DSFM controller 601 may be connected to and/or communicate with entities such as, but not limited to: one or more users from user input devices 611; peripheral devices 612; an optional cryptographic processor device 628; and/or a communications network 613.
  • the DSFM controller 601 may be connected to and/or communicate with users, e.g., 633a, operating client device(s), e.g., 633b, including, but not limited to, personal computer(s), server(s) and/or various mobile device(s) including, but not limited to, cellular telephone(s), smartphone(s) (e.g., iPhone®, Blackberry®, Android OS-based phones etc.), tablet computer(s) (e.g., Apple iPadTM, HP SlateTM, Motorola XoomTM, etc.), eBook reader(s) (e.g., Amazon KindleTM, Barnes and Noble's NookTM eReader, etc.), laptop
  • smartphones e.g., iPhone®, Blackberry®, Android OS-based phones etc.
  • tablet computer(s) e.g., Apple iPadTM, HP SlateTM, Motorola XoomTM, etc.
  • eBook reader(s) e.g., Amazon KindleTM, Barnes and Noble's NookTM eReader, etc
  • Networks are commonly thought to include the interconnection and interoperation of clients, servers, and intermediary nodes in a graph topology.
  • server refers generally to a computer, other device, program, or combination thereof that processes and responds to the requests of remote users across a communications network. Servers serve their information to requesting "clients.”
  • client refers generally to a computer, program, other device, user and/or combination thereof that is capable of processing and making requests and obtaining and processing any responses from servers across a communications network.
  • a computer, other device, program, or combination thereof that facilitates, processes information and requests, and/or furthers the passage of information from a source user to a destination user is commonly referred to as a "node.”
  • Networks are generally thought to facilitate the transfer of information from source points to destinations.
  • a node specifically tasked with furthering the passage of information from a source to a destination is commonly called a "router.”
  • There are many forms of networks such as Local Area Networks (LANs), Pico networks, Wide Area Networks (WANs), Wireless Networks (WLANs), etc.
  • LANs Local Area Networks
  • WANs Wide Area Networks
  • WLANs Wireless Networks
  • the Internet is generally accepted as being an interconnection of a multitude of networks whereby remote clients and servers may access and interoperate with one another.
  • the DSFM controller 601 may be based on computer systems that may include, but are not limited to, components such as: a computer systemization 602 connected to memory 629.
  • a computer system 602 typically includes a clock 630, central processing unit
  • CPU(s) and/or “processor(s)” are used interchangeably throughout the disclosure unless noted to the contrary) 603, a memory 629 (e.g., a read only memory (ROM) 606, a random access memory (RAM) 605, etc.), and/or an interface bus 607, and most frequently, although not necessarily, are all interconnected and/or communicating through a system bus 604 on one or more (mother)board(s) 602 having conductive and/or otherwise transportive circuit pathways through which instructions (e.g., binary encoded signals) may travel to effectuate communications, operations, storage, etc.
  • the computer systemization may be connected to a power source 686; e.g., optionally the power source may be internal.
  • a cryptographic processor 626 and/or transceivers may be connected to the system bus.
  • the cryptographic processor and/or transceivers may be connected as either internal and/or external peripheral devices 612 via the interface bus I/O.
  • the transceivers may be connected to antenna(e) 675, thereby effectuating wireless transmission and reception of various communication and/or sensor protocols; for example the antenna(e) may connect to: a Texas Instruments WiLink WL1283 transceiver chip (e.g., providing 802.1 In, Bluetooth 3.0, FM, global positioning system (GPS) (thereby allowing a DSFM controller to determine its location)); Broadcom BCM4329FKUBG transceiver chip (e.g., providing 802.1 In, Bluetooth 2.1 + EDR, FM, etc.), BCM28150 (HSPA+) and BCM2076 (Bluetooth 4.0, GPS, etc.); a Broadcom BCM4750IUB8 receiver chip (e.g., GPS); an Infineon Technologies X-Gold 618-PMB9800 (e.g., providing 2G/3G HSDPA/HSUPA communications); Intel's XMM 7160 (LTE & DC- HSPA), Qualcom's CDMA(2000), Mobile Data/S
  • the system clock may have a crystal oscillator and generates a base signal through the computer systemization's circuit pathways.
  • the clock may be coupled to the system bus and various clock multipliers that will increase or decrease the base operating frequency for other components interconnected in the computer systemization.
  • the clock and various components in a computer systemization drive signals embodying information throughout the system. Such transmission and reception of instructions embodying information throughout a computer systemization may be referred to as communications. These communicative instructions may further be transmitted, received, and the cause of return and/or reply communications beyond the instant computer systemization to: communications networks, input devices, other computer systemizations, peripheral devices, and/or the like. It should be understood that in alternative embodiments, any of the above components may be connected directly to one another, connected to the CPU, and/or organized in numerous variations employed as exemplified by various computer systems.
  • the CPU may include at least one high-speed data processor adequate to execute program components for executing user and/or system-generated requests.
  • the processors themselves will incorporate various specialized processing units, such as, but not limited to: floating point units, integer processing units, integrated system (bus) controllers, logic operating units, memory management control units, etc. and even specialized processing sub-units like graphics processing units, digital signal processing units, and/or the like.
  • processors may include internal fast access addressable memory, and be capable of mapping and addressing memory 629 beyond the processor itself; internal memory may include, but is not limited to: fast registers, various levels of cache memory (e.g., level 1, 2, 3, etc.), RAM, etc.
  • the processor may access this memory through the use of a memory address space that is accessible via instruction address, which the processor can construct and decode allowing it to access a circuit path to a specific memory address space having a memory state/value.
  • the CPU may be a microprocessor such as: AMD's Athlon, Duron and/or Opteron; ARM's classic (e.g.,
  • the CPU interacts with memory through instruction passing through conductive and/or transportive conduits (e.g., (printed) electronic and/or optic circuits) to execute stored instructions (i.e., program code).
  • conductive and/or transportive conduits e.g., (printed) electronic and/or optic circuits
  • Such instruction passing facilitates communication within the DSFM controller and beyond through various interfaces.
  • distributed processors e.g., Distributed DSFM system/controller
  • mainframe multi-core
  • parallel and/or super-computer architectures
  • smaller mobile devices e.g., smartphones, Personal Digital Assistants (PDAs), etc.
  • PDAs Personal Digital Assistants
  • features of the DSFM system may be achieved by implementing a microcontroller such as CAST'S R8051XC2 microcontroller; Intel's MCS 51 (i.e., 8051 microcontroller); and/or the like.
  • a microcontroller such as CAST'S R8051XC2 microcontroller; Intel's MCS 51 (i.e., 8051 microcontroller); and/or the like.
  • some feature implementations may rely on embedded components, such as: Application-Specific Integrated Circuit (“ASIC”), Digital Signal Processing (“DSP”), Field Programmable Gate Array (“FPGA”), and/or the like embedded technology.
  • ASIC Application-Specific Integrated Circuit
  • DSP Digital Signal Processing
  • FPGA Field Programmable Gate Array
  • any of the DSFM component collection distributed or otherwise, e.g.
  • IMAS 341, etc. may be implemented via the microprocessor and/or via embedded components; e.g., via ASIC, coprocessor, DSP, FPGA, and/or the like. Alternately, some implementations of the DSFM system may be implemented with embedded components that are configured and used to achieve a variety of features or signal processing.
  • the embedded components may include software solutions, hardware solutions, and/or some combination of both
  • DSFM system features discussed herein may be achieved through implementing FPGAs, which are a semiconductor devices containing programmable logic components called “logic blocks", and programmable interconnects, such as the high performance FPGA Virtex series and/or the low cost Spartan series manufactured by Xilinx.
  • Logic blocks and interconnects can be programmed by the customer or designer, after the FPGA is manufactured, to implement any of the DSFM system features.
  • a hierarchy of programmable interconnects allow logic blocks to be interconnected as needed by the DSFM system designer/administrator, somewhat like a one-chip programmable breadboard.
  • An FPGA's logic blocks can be programmed to perform the operation of basic logic gates such as AND, and XOR, or more complex combinational operators such as decoders or simple mathematical operations.
  • the logic blocks also include memory elements, which may be circuit flip-flops or more complete blocks of memory.
  • the DSFM system may be developed on regular FPGAs and then migrated into a fixed version that more resembles ASIC implementations. Alternate or coordinating implementations may migrate one or more DSFM controller features to a final ASIC instead of or in addition to FPGAs.
  • all of the aforementioned embedded components and microprocessors may be considered the "CPU" and/or "processor" for the DSFM system.
  • the power source 686 may be of any standard form for powering small electronic circuit board devices such as the following power cells: alkaline, lithium hydride, lithium ion, lithium polymer, nickel cadmium, solar cells, and/or the like. Other types of AC or DC power sources may be used as well. In the case of solar cells, in one embodiment, the case provides an aperture through which the solar cell may capture photonic energy.
  • the power cell 686 is connected to at least one of the interconnected subsequent components of the DSFM system thereby providing an electric current to all their interconnected components.
  • the power source 686 is connected to the system bus component 604.
  • an outside power source 686 is provided through a connection across the I/O 608 interface. For example, a USB and/or IEEE 1394 connection carries both data and power across the connection and is therefore a suitable source of power.
  • Interface bus(ses) 607 may accept, connect, and/or communicate to a number of interface adapters, frequently, although not necessarily in the form of adapter cards, such as but not limited to: input output interfaces (I/Os) 608, storage interfaces 609, network interfaces 610, and/or the like.
  • cryptographic processor interfaces 627 similarly may be connected to the interface bus.
  • the interface bus provides for the communications of interface adapters with one another as well as with other components of the computer systemization. Interface adapters are adapted for a compatible interface bus. Interface adapters may connect to the interface bus via an expansion and/or slot architecture.
  • Various expansion and/or slot architectures that be employed, such as, but not limited to: Accelerated Graphics Port (AGP), Card Bus, ExpressCard, (Extended) Industry Standard Architecture ((E)ISA), Micro Channel Architecture (MCA), NuBus, Peripheral Component Interconnect (Extended) (PCI(X)), PCI Express, Personal Computer Memory Card International Association (PCMCIA), Thunderbolt, and/or the like.
  • AGP Accelerated Graphics Port
  • Card Bus ExpressCard
  • ExpressCard Extended Industry Standard Architecture
  • MCA Micro Channel Architecture
  • NuBus NuBus
  • PCI(X) Peripheral Component Interconnect
  • PCI Express Personal Computer Memory Card International Association
  • PCMCIA Personal Computer Memory Card International Association
  • Thunderbolt Thunderbolt, and/or the like.
  • Storage interfaces 609 may accept, communicate, and/or connect to a number of storage devices such as, but not limited to: storage devices 614, removable disc devices, and/or the like.
  • Storage interfaces may employ connection protocols such as, but not limited to: (Ultra) (Serial) Advanced Technology Attachment (Packet Interface) ((Ultra) (Serial) ATA(PI)), (Enhanced) Integrated Drive Electronics ((E)IDE), Institute of Electrical and Electronics Engineers (IEEE) 1394, Ethernet, fiber channel, Small Computer Systems Interface (SCSI), Thunderbolt, Universal Serial Bus (USB), and/or the like.
  • connection protocols such as, but not limited to: (Ultra) (Serial) Advanced Technology Attachment (Packet Interface) ((Ultra) (Serial) ATA(PI)), (Enhanced) Integrated Drive Electronics ((E)IDE), Institute of Electrical and Electronics Engineers (IEEE) 1394, Ethernet, fiber channel, Small Computer Systems Interface (SCSI), Thunderbolt, Universal Serial
  • Network interfaces 610 may accept, communicate, and/or connect to a communications network 613.
  • the DSFM controller is accessible through remote clients 633b (e.g., computers with web browsers) by users 633a.
  • Network interfaces may employ connection protocols such as, but not limited to: direct connect, Ethernet (thick, thin, twisted pair 10/100/1000 Base T, and/or the like), Token Ring, wireless connection such as IEEE 802.1 la-x, and/or the like.
  • connection protocols such as, but not limited to: direct connect, Ethernet (thick, thin, twisted pair 10/100/1000 Base T, and/or the like), Token Ring, wireless connection such as IEEE 802.1 la-x, and/or the like.
  • distributed network controllers e.g., Distributed DSFM system
  • architectures may similarly be employed to pool, load balance, and/or otherwise increase the communicative bandwidth required by the DSFM controller.
  • a communications network may be any one and/or the combination of the following: a direct interconnection; the Internet; a Local Area Network (LAN); a Metropolitan Area Network (MAN); an Operating Missions as Nodes on the Internet (OMNI); a secured custom connection; a Wide Area Network (WAN); a wireless network (e.g., employing protocols such as, but not limited to a Wireless Application Protocol (WAP), I-mode, and/or the like); and/or the like.
  • a network interface may be regarded as a specialized form of an input output (I/O) interface.
  • multiple network interfaces 610 may be used to engage with various communications network types 613. For example, multiple network interfaces may be employed to allow for the communication over broadcast, multicast, and/or unicast networks.
  • I/Os 608 may accept, communicate, and/or connect to user input devices 611, peripheral devices 612, cryptographic processor devices 628, and/or the like. I/Os may employ connection protocols such as, but not limited to: audio: analog, digital, monaural, RCA, stereo, and/or the like; data: Apple Desktop Bus (ADB), Bluetooth, IEEE 1394a-b, serial, universal serial bus (USB); infrared; joystick; keyboard; midi; optical; PC AT; PS/2; parallel; radio; video interface: Apple Desktop Connector (ADC), BNC, coaxial, component, composite, digital, DisplayPort, Digital Visual Interface (DVI), high-definition multimedia interface (HDMI), RCA, RF antennae, S-Video, VGA, and/or the like; wireless transceivers: 802.1 la/b/g/n/x; Bluetooth; cellular (e.g., code division multiple access (CDMA), high speed packet access (HSPA(+)), high-
  • CDMA code division multiple access
  • One output device may be a video display, which may take the form of a Cathode Ray Tube (CRT), Liquid Crystal Display (LCD), Light Emitting Diode (LED), Organic Light Emitting Diode (OLED), Plasma, and/or the like based monitor with an interface (e.g., VGA, DVI circuitry and cable) that accepts signals from a video interface.
  • the video interface composites information generated by a computer systemization and generates video signals based on the composited information in a video memory frame.
  • Another output device is a television set, which accepts signals from a video interface.
  • the video interface provides the composited video information through a video connection interface that accepts a video display interface (e.g., an RCA composite video connector accepting an RCA composite video cable; a DVI connector accepting a DVI display cable, HDMI, etc.).
  • a video display interface e.g., an RCA composite video connector accepting an RCA composite video cable; a DVI connector accepting a DVI display cable, HDMI, etc.
  • User input devices 611 often are a type of peripheral device 612 (see below) and may include: card readers, dongles, finger print readers, gloves, graphics tablets, joysticks, keyboards, microphones, mice, remote controls, retina readers, touch screens (e.g., capacitive, resistive, etc.), trackballs, trackpads, sensors (e.g., accelerometers, ambient light, GPS, gyroscopes, proximity, etc.), styluses, and/or the like.
  • peripheral device 612 may include: card readers, dongles, finger print readers, gloves, graphics tablets, joysticks, keyboards, microphones, mice, remote controls, retina readers, touch screens (e.g., capacitive, resistive, etc.), trackballs, trackpads, sensors (e.g., accelerometers, ambient light, GPS, gyroscopes, proximity, etc.), styluses, and/or the like.
  • Peripheral devices 612 may be connected and/or communicate to I/Os and/or other facilities of the like such as network interfaces, storage interfaces, directly to the interface bus, system bus, the CPU, and/or the like. Peripheral devices may be external, internal and/or part of the DSFM controller.
  • Peripheral devices may include: antennae, audio devices (e.g., line- in, line-out, microphone input, speakers, etc.), cameras (e.g., still, video, webcam, etc.), dongles (e.g., for copy protection, ensuring secure transactions with a digital signature, and/or the like), external processors (for added capabilities; e.g., crypto devices 628), force-feedback devices (e.g., vibrating motors), near field communication (NFC) devices, network interfaces, printers, radio frequency identifiers (RFIDs), scanners, storage devices, transceivers (e.g., cellular, GPS, etc.), video devices (e.g., goggles, monitors, etc.), video sources, visors, and/or the like.
  • audio devices e.g., line- in, line-out, microphone input, speakers, etc.
  • cameras e.g., still, video, webcam, etc.
  • dongles e.g., for copy
  • Peripheral devices often include types of input devices (e.g., microphones, cameras, etc.).
  • the DSFM controller may be embodied as an embedded, dedicated, and/or monitor- less (i.e., headless) device, wherein access would be provided over a network interface connection.
  • Cryptographic units such as, but not limited to, microcontrollers, processors 626, interfaces 627, and/or devices 628 may be attached, and/or communicate with the DSFM controller.
  • a MC68HC16 microcontroller, manufactured by Motorola Inc., may be used for and/or within cryptographic units.
  • the MC68HC16 microcontroller utilizes a 16-bit multiply- and-accumulate instruction in the 16 MHz configuration and requires less than one second to perform a 512-bit RSA private key operation.
  • Cryptographic units support the authentication of communications from interacting agents, as well as allowing for anonymous transactions.
  • Cryptographic units may also be configured as part of the CPU. Equivalent microcontrollers and/or processors may also be used. Other commercially available specialized cryptographic processors include: the Broadcom's CryptoNetX and other Security Processors; nCipher's nShield (e.g., Solo, Connect, etc.), SafeNet's Luna PCI (e.g., 7100) series; Semaphore
  • any mechanization and/or embodiment allowing a processor to affect the storage and/or retrieval of information is regarded as memory 629.
  • memory is a fungible technology and resource, thus, any number of memory embodiments may be employed in lieu of or in concert with one another.
  • the DSFM controller and/or a computer systemization may employ various forms of memory 629.
  • a computer systemization may be configured wherein the operation of on-chip CPU memory (e.g., registers), RAM, ROM, and any other storage devices are provided by a paper punch tape or paper punch card mechanism; however, such an embodiment would result in an extremely slow rate of operation.
  • memory 629 will include ROM 606, RAM 605, and a storage device 614.
  • a storage device 614 may employ any number of computer storage devices/sy stems. Storage devices may include a drum; a (fixed and/or removable) magnetic disk drive; a magneto- optical drive; an optical drive (i.e., Blueray, CD ROM/RAM/Recordable (R)/Re Writable (RW), DVD R/RW, HD DVD R/RW etc.); an array of devices (e.g., Redundant Array of Independent Disks (RAID)); solid state memory devices (USB memory, solid state drives (SSD), etc.); other processor-readable storage mediums; and/or other devices of the like.
  • a computer systemization generally requires and makes use of memory.
  • the memory 629 may contain a collection of program and/or database
  • operating system component(s) 615 components and/or data such as, but not limited to: operating system component(s) 615
  • information server component(s) 616 information server
  • user interface component(s) 617 user interface
  • Web browser component(s) 618 Web browser
  • database(s) 619 mail server component(s) 621; mail client component(s) 622; cryptographic server component(s) 620 (cryptographic server); the DSFM component(s) 635; and/or the like (i.e., collectively a component collection).
  • These components may be stored and accessed from the storage devices and/or from storage devices accessible through an interface bus.
  • non- conventional program components such as those in the component collection, may be stored in a local storage device 614, they may also be loaded and/or stored in memory such as: peripheral devices, RAM, remote storage facilities through a communications network, ROM, various forms of memory, and/or the like.
  • the operating system component 615 is an executable program component facilitating the operation of the DSFM controller.
  • the operating system may facilitate access of I/Os, network interfaces, peripheral devices, storage devices, and/or the like.
  • the operating system may be a highly fault tolerant, scalable, and secure system such as: Apple Macintosh OS X (Server); AT&T Plan 9; Be OS; Unix and Unix-like system distributions (such as AT&T's UNIX; Berkley Software Distribution (BSD) variations such as FreeBSD, NetBSD, OpenBSD, and/or the like; Linux distributions such as Red Hat, Ubuntu, and/or the like); and/or the like operating systems.
  • Apple Macintosh OS X Server
  • AT&T Plan 9 Be OS
  • Unix and Unix-like system distributions such as AT&T's UNIX
  • Berkley Software Distribution (BSD) variations such as FreeBSD, NetBSD, OpenBSD, and/or the like
  • Linux distributions such
  • an operating system may communicate to and/or with other components in a component collection, including itself, and/or the like. Most frequently, the operating system communicates with other program components, user interfaces, and/or the like. For example, the operating system may contain, communicate, generate, obtain, and/or provide program
  • the operating system once executed by the CPU, may enable the interaction with communications networks, data, I/Os, peripheral devices, program components, memory, user input devices, and/or the like.
  • the operating system may provide communications protocols that allow the DSFM controller to communicate with other entities through a communications network 613.
  • An information server component 616 is a stored program component that is executed by a CPU.
  • the information server may be an Internet information server such as, but not limited to, Apache Software Foundation's Apache, Microsoft's Internet Information Server, and/or the like.
  • the information server may allow for the execution of program components through facilities such as Active Server Page (ASP), ActiveX, (ANSI) (Objective-) C (++), C# and/or .NET, Common Gateway Interface (CGI) scripts, dynamic (D) hypertext markup language (HTML), FLASH, Java, JavaScript, Practical Extraction Report Language (PERL), Hypertext Pre-Processor (PHP), pipes, Python, wireless application protocol (WAP),
  • ASP Active Server Page
  • ActiveX ActiveX
  • ANSI Objective-
  • C C#
  • CGI Common Gateway Interface
  • D dynamic hypertext markup language
  • FLASH FLASH
  • Java Java
  • JavaScript JavaScript
  • Practical Extraction Report Language PROL
  • PGP Hypertext Pre-Processor
  • Python Python
  • WAP wireless application protocol
  • the information server may support secure communications protocols such as, but not limited to, File Transfer Protocol (FTP); HyperText Transfer Protocol (HTTP); Secure Hypertext Transfer Protocol (HTTPS), Secure Socket Layer (SSL), messaging protocols (e.g., America Online (AOL) Instant Messenger (AIM), Apple's iMessage, Application Exchange (APEX), ICQ, Internet Relay Chat (IRC), Microsoft Network (MSN) Messenger Service, Presence and Instant Messaging Protocol (PRIM), Internet Engineering Task Force's (IETF's) Session Initiation Protocol (SIP), SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE), open XML-based Extensible Messaging and Presence Protocol (XMPP) (i.e., Jabber or Open Mobile Alliance's (OMA's) Instant Messaging and Presence Service (IMPS)), Yahoo!
  • FTP File Transfer Protocol
  • HTTP HyperText Transfer Protocol
  • HTTPS Secure Hypertext Transfer Protocol
  • SSL Secure Socket Layer
  • messaging protocols e.
  • the information server provides results in the form of Web pages to Web browsers, and allows for the manipulated generation of the Web pages through interaction with other program components.
  • DNS Domain Name System
  • the information server resolves requests for information at specified locations on the DSFM controller based on the remainder of the HTTP request. For example, a request such as http://123.124.125.126/myInformation.html might have the IP portion of the request "123.124.125.126" resolved by a DNS server to an information server at that IP address; that information server might in turn further parse the http request for the "/mylnformation.html" portion of the request and resolve it to a location in memory containing the information
  • DNS Domain Name System
  • An information server may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the information server communicates with the DSFM database 619, operating systems, other program components, user interfaces, Web browsers, and/or the like.
  • Access to the DSFM database may be achieved through a number of database bridge mechanisms such as through scripting languages as enumerated below (e.g., CGI) and through inter-application communication channels as enumerated below (e.g., CORBA, WebObjects, etc.). Any data requests through a Web browser are parsed through the bridge mechanism into appropriate grammars as required by the DSFM.
  • the information server would provide a Web form accessible by a Web browser. Entries made into supplied fields in the Web form are tagged as having been entered into the particular fields, and parsed as such. The entered terms are then passed along with the field tags, which act to instruct the parser to generate queries directed to appropriate tables and/or fields.
  • the parser may generate queries in standard SQL by instantiating a search string with the proper join/select commands based on the tagged text entries, wherein the resulting command is provided over the bridge mechanism to the DSFM as a query.
  • the results are passed over the bridge mechanism, and may be parsed for formatting and generation of a new results Web page by the bridge mechanism. Such a new results Web page is then provided to the information server, which may supply it to the requesting Web browser.
  • an information server may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • Computer interfaces in some respects are similar to automobile operation interfaces.
  • Automobile operation interface elements such as steering wheels, gearshifts, and speedometers facilitate the access, operation, and display of automobile resources, and status.
  • Computer interaction interface elements such as check boxes, cursors, menus, scrollers, and windows (collectively and commonly referred to as widgets) similarly facilitate the access, capabilities, operation, and display of data and computer hardware and operating system resources, and status.
  • Operation interfaces are commonly called user interfaces.
  • GUIs Graphical user interfaces
  • GUIs such as the Apple Macintosh Operating System's Aqua and iOS's Cocoa Touch, IBM's OS/2, Google's Android Mobile UI, Microsoft's Windows
  • Unix's X- Windows e.g., which may include additional Unix graphic interface libraries and layers such as K Desktop Environment (KDE), mytfiTV and GNU Network Object Model Environment (GNOME)), web interface libraries (e.g., ActiveX, AJAX, (D)HTML, FLASH, Java, JavaScript, etc. interface libraries such as, but not limited to, Dojo, jQuery(UI), MooTools, Prototype, script, aculo .us, SWFObject, Yahoo!
  • KDE K Desktop Environment
  • GNOME GNU Network Object Model Environment
  • web interface libraries e.g., ActiveX, AJAX, (D)HTML, FLASH, Java, JavaScript, etc. interface libraries such as, but not limited to, Dojo, jQuery(UI), MooTools, Prototype, script, aculo .us, SWFObject, Yahoo!
  • a user interface component 617 is a stored program component that is executed by a CPU.
  • the user interface may be a graphic user interface as provided by, with, and/or atop operating systems and/or operating environments such as already discussed.
  • the user interface may allow for the display, execution, interaction, manipulation, and/or operation of program components and/or system facilities through textual and/or graphical facilities.
  • the user interface provides a facility through which users may affect, interact, and/or operate a computer system.
  • a user interface may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the user interface communicates with operating systems, other program components, and/or the like.
  • the user interface may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • a Web browser component 618 is a stored program component that is executed by a CPU.
  • the Web browser may be a hypertext viewing application such as Google's (Mobile) Chrome, Microsoft Internet Explorer, Netscape Navigator, Apple's (Mobile) Safari, embedded web browser objects such as through Apple's Cocoa (Touch) object class, and/or the like.
  • Secure Web browsing may be supplied with 128bit (or greater) encryption by way of HTTPS, SSL, and/or the like.
  • Web browsers allowing for the execution of program components through facilities such as ActiveX, AJAX, (D)HTML, FLASH, Java, JavaScript, web browser plug-in APIs (e.g., Chrome, FireFox, Internet Explorer, Safari Plug-in, and/or the like APIs), and/or the like.
  • Web browsers and like information access tools may be integrated into PDAs, cellular telephones, smartphones, and/or other mobile devices.
  • a Web browser may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like.
  • the Web browser communicates with information servers, operating systems, integrated program components (e.g., plug-ins), and/or the like; e.g., it may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • information servers operating systems, integrated program components (e.g., plug-ins), and/or the like; e.g., it may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • a combined application may be developed to perform similar operations of both. The combined application would similarly effect the obtaining and the provision of information to users, user agents, and/or the like from the DSFM equipped nodes.
  • the combined application may be nugatory on systems employing standard Web browsers.
  • a mail server component 621 is a stored program component that is executed by a
  • the mail server may be an Internet mail server such as, but not limited to Apple's Mail Server (3), dovecot, sendmail, Microsoft Exchange, and/or the like.
  • the mail server may allow for the execution of program components through facilities such as ASP, ActiveX, (ANSI) (Objective-) C (++), C# and/or .NET, CGI scripts, Java, JavaScript, PERL, PHP, pipes, Python, WebObjects, and/or the like.
  • the mail server may support communications protocols such as, but not limited to: Internet message access protocol (IMAP), Messaging Application Programming Interface (MAPI)/Microsoft Exchange, post office protocol (POP3), simple mail transfer protocol (SMTP), and/or the like.
  • the mail server can route, forward, and process incoming and outgoing mail messages that have been sent, relayed and/or are otherwise traversing through and/or to the DSFM system.
  • Access to the DSFM system mail may be achieved through a number of APIs offered by the individual Web server components and/or the operating system.
  • a mail server may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, information, and/or responses.
  • a mail client component 622 is a stored program component that is executed by a
  • the mail client may be a mail viewing application such as Apple (Mobile) Mail, Microsoft Entourage, Microsoft Outlook, Microsoft Outlook Express, Mozilla, Thunderbird, and/or the like.
  • Mail clients may support a number of transfer protocols, such as: IMAP, Microsoft Exchange, POP3, SMTP, and/or the like.
  • a mail client may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the mail client communicates with mail servers, operating systems, other mail clients, and/or the like; e.g., it may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, information, and/or responses.
  • the mail client provides a facility to compose and transmit electronic mail messages.
  • a cryptographic server component 620 is a stored program component that is executed by a CPU 603, cryptographic processor 626, cryptographic processor interface 627, cryptographic processor device 628, and/or the like. Cryptographic processor interfaces will allow for expedition of encryption and/or decryption requests by the cryptographic component; however, the cryptographic component, alternatively, may run on a CPU. The cryptographic component allows for the encryption and/or decryption of provided data. The cryptographic component allows for both symmetric and asymmetric (e.g., Pretty Good Protection (PGP)) encryption and/or decryption.
  • PGP Pretty Good Protection
  • the cryptographic component may employ cryptographic techniques such as, but not limited to: digital certificates (e.g., X.509 authentication framework), digital signatures, dual signatures, enveloping, password access protection, public key management, and/or the like.
  • the cryptographic component will facilitate numerous (encryption and/or decryption) security protocols such as, but not limited to: checksum, Data Encryption Standard (DES), Elliptical Curve Encryption (ECC), International Data Encryption Algorithm (IDEA), Message Digest 5 (MD5, which is a one way hash operation), passwords, Rivest Cipher (RC5), Rijndael, RSA (which is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman), Secure Hash Algorithm (SHA), Secure Socket Layer (SSL), Secure Hypertext Transfer Protocol (HTTPS), and/or the like.
  • digital certificates e.g., X.509 authentication
  • the DSFM system may encrypt all incoming and/or outgoing communications and may serve as node within a virtual private network (VPN) with a wider communications network.
  • the cryptographic component facilitates the process of "security authorization" whereby access to a resource is inhibited by a security protocol wherein the cryptographic component effects authorized access to the secured resource.
  • the cryptographic component may provide unique identifiers of content, e.g., employing and MD5 hash to obtain a unique signature for an digital audio file.
  • a cryptographic component may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like.
  • the cryptographic component supports encryption schemes allowing for the secure transmission of information across a communications network to enable one or more DSFM components to engage in secure transactions if so desired.
  • the cryptographic component facilitates the secure accessing of resources on the DSFM system and facilitates the access of secured resources on remote systems; i.e., it may act as a client and/or server of secured resources.
  • the cryptographic component communicates with information servers, operating systems, other program components, and/or the like.
  • the cryptographic component may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • the DSFM database component 619 may be embodied in a database and its stored data.
  • the database is a stored program component, which is executed by the CPU; the stored program component portion configuring the CPU to process the stored data.
  • the database may be any of a number of fault tolerant, relational, scalable, secure database such as DB2, MySQL, Oracle, Sybase, and/or the like.
  • Relational databases are an extension of a flat file. Relational databases consist of a series of related tables. The tables are interconnected via a key field. Use of the key field allows the combination of the tables by indexing against the key field; i.e., the key fields act as dimensional pivot points for combining information from various tables. Relationships generally identify links maintained between tables by matching primary keys. Primary keys represent fields that uniquely identify the rows of a table in a relational database. More precisely, they uniquely identify rows of a table on the "one" side of a "one-to-many" relationship.
  • the DSFM database may be implemented using various standard data-structures, such as an array, hash, (linked) list, struct, structured text file (e.g., XML), table, and/or the like. Such data-structures may be stored in memory and/or in (structured) files.
  • an object-oriented database may be used, such as Frontier, ObjectStore, Poet, Zope, and/or the like.
  • Object databases can include a number of object collections that are grouped and/or linked together by common attributes; they may be related to other object collections by some common attributes. Object-oriented databases perform similarly to relational databases with the exception that objects are not just pieces of data but may have other types of capabilities encapsulated within a given object.
  • the DSFM database is implemented as a data- structure
  • the use of the DSFM database 619 may be integrated into another component such as the DSFM component 635.
  • the database may be implemented as a mix of data structures, objects, and relational structures. Databases may be consolidated and/or distributed in countless variations through standard data processing techniques. Portions of databases, e.g., tables, may be exported and/or imported and thus decentralized and/or integrated.
  • the database component 619 includes several tables 619a-f.
  • a Users table 619a may include fields such as, but not limited to: user id, ssn, dob, first name, last_name, age, state, address_firstline, address_secondline, zipcode, devices_list, contact_info, contact type, alt contact info, alt contact type, and/or the like.
  • the Users table may support and/or track multiple entity accounts on a DSFM system.
  • a Clients table 619b may include fields such as, but not limited to: device lD, device name, device lP, deviceJVIAC, devicejype, device_model, device_version, device_OS, device_apps_list, device_securekey, and/or the like.
  • An Apps table 619c may include fields such as, but not limited to:
  • a Messages table 619d may include fields such as, but not limited to: msg id, msg_application, timestamp, msg_details_list, message_size, message_origin,
  • a Failover table 619e may include fields such as, but not limited to: failover lD, failover timestamp, primary application, secondary application, failover check time, and/or the like.
  • a Code Paths table 619f may include fields such as, but not limited to: codepath ID, codepath itrtions, optmz thrshld min, optmz thrshld max, codepath length, codepath_priorty, and/or the like.
  • the DSFM database may interact with other database systems. For example, employing a distributed database system, queries and data access by search DSFM component may treat the combination of the DSFM database, an integrated data security layer database as a single database entity.
  • user programs may contain various user interface primitives, which may serve to update the DSFM system.
  • various accounts may require custom database tables depending upon the environments and the types of clients the DSFM system may need to serve. It should be noted that any unique fields may be designated/labelled as a key field throughout. In an alternative embodiment, these tables have been decentralized into their own databases and their respective database controllers (i.e., individual database controllers for each of the above tables).
  • DSFM system may be configured to keep track of various settings, inputs, and parameters via database controllers.
  • the DSFM database may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the DSFM database communicates with one or more DSFM components, other program components, and/or the like.
  • the database may contain, retain, and provide information regarding other nodes and data.
  • the DSFM component 635 is a stored program component that is executed by a
  • the DSFM component incorporates any and/or all combinations of the aspects of the various embodiments of a DSFM system discussed in the previous figures. As such, embodiments of the DSFM system can affect accessing, obtaining and the provision of information, services, transactions, and/or the like across various communications networks.
  • the one or more DSFM components may remedy a failed execution at a primary instance of a software application into an execution of secondary instance of the software application that is in sync with the execution of the primary instance prior to failure thereof.
  • the DSFM component 635 takes inputs (e.g., fragmented virtual addresses 204; and/or the like) etc., and transforms the inputs via various components (e.g., IMAS 641; and/or the like), into outputs (e.g., continous and infinite virtual memory address space 206; and/or the like).
  • the DSFM component(s) enabling access of information between nodes may be developed by employing standard development tools and languages such as, but not limited to: Apache components, Assembly, ActiveX, binary executables, (ANSI) (Objective-) C (++), C# and/or .NET, database adapters, CGI scripts, Java, JavaScript, mapping tools, procedural and object oriented development tools, PERL, PHP, Python, shell scripts, SQL commands, web application server extensions, web development environments and libraries (e.g., Microsoft's ActiveX; Adobe AIR, FLEX & FLASH; AJAX; (D)HTML; Dojo, Java; JavaScript; jQuery(UI); MooTools; Prototype; script.aculo.us; Simple Object Access Protocol (SOAP); SWFObject; Yahoo!
  • Apache components Assembly, ActiveX, binary executables, (ANSI) (Objective-) C (++), C# and/or .NET
  • database adapters CGI scripts
  • Java JavaScript
  • mapping tools procedura
  • a DSFM server employs a cryptographic server to encrypt and decrypt communications.
  • the DSFM component(s) may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the DSFM component(s) communicates with the DSFM database, operating systems, other program components, and/or the like.
  • Embodiments of the DSFM system may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
  • any of the DSFM node controller components may be combined, consolidated, and/or distributed in any number of ways to facilitate development and/or deployment.
  • the component collection may be combined in any number of ways to facilitate deployment and/or development. To accomplish this, one may integrate the components into a common code base or in a facility that can dynamically load the components on demand in an integrated fashion.
  • the component collection may be consolidated and/or distributed in countless variations through standard data processing and/or development techniques. Multiple instances of any one of the program components in the program component collection may be instantiated on a single node, and/or across numerous nodes to improve performance through load-balancing and/or data-processing techniques. Furthermore, single instances may also be distributed across multiple controllers and/or storage devices; e.g., databases. All program component instances and controllers working in concert may do so through standard data processing communication techniques.
  • the configuration of the embodiments of a DSFM controller may depend on the context of system deployment. Factors such as, but not limited to, the budget, capacity, location, and/or use of the underlying hardware resources may affect deployment requirements and configuration. Regardless of whether the configuration results in more consolidated and/or integrated program components, results in a more distributed series of program components, and/or results in some combination between a consolidated and distributed configuration, data may be communicated, obtained, and/or provided. Instances of components consolidated into a common code base from the program component collection may communicate, obtain, and/or provide data. This may be accomplished through intra-application data processing
  • communication techniques such as, but not limited to: data referencing (e.g., pointers), internal messaging, object instance variable communication, shared memory space, variable passing, and/or the like.
  • component collection components are discrete, separate, and/or external to one another, then communicating, obtaining, and/or providing data with and/or to other components may be accomplished through inter-application data processing communication techniques such as, but not limited to: Application Program Interfaces (API) information passage; (distributed) Component Object Model ((D)COM), (Distributed) Object Linking and Embedding ((D)OLE), and/or the like), Common Object Request Broker Architecture (CORBA), Jini local and remote application program interfaces, JavaScript Object Notation (JSON), Remote Method Invocation (RMI), SOAP, process pipes, shared files, and/or the like.
  • API Application Program Interfaces
  • DCOM Component Object Model
  • CORBA Common Object Request Broker Architecture
  • JSON JavaScript Object Notation
  • RMI Remote Method Invocation
  • SOAP process pipes, shared files, and/or the like.
  • a grammar may be developed by using development tools such as lex, yacc, XML, and/or the like, which allow for grammar generation and parsing capabilities, which in turn may form the basis of communication messages within and between components.
  • a grammar may be arranged to recognize the tokens of an HTTP post command, e.g.:
  • Value 1 is discerned as being a parameter because "http ://" is part of the grammar syntax, and what follows is considered part of the post value. Similarly, with such a grammar, a variable “Valuel” may be inserted into an "http://" post command and then sent.
  • the grammar syntax itself may be presented as structured data that is interpreted and/or otherwise used to generate the parsing mechanism (e.g., a syntax description text file as processed by lex, yacc, etc.).
  • parsing mechanism may process and/or parse structured data such as, but not limited to: character (e.g., tab) delineated text, HTML, structured text streams, XML, and/or the like structured data.
  • character e.g., tab
  • inter-application data processing protocols themselves may have integrated and/or readily available parsers (e.g., JSON, SOAP, and/or like parsers) that may be employed to parse data (e.g., communications).
  • parsing grammar may be used beyond message parsing, but may also be used to parse: databases, data collections, data stores, structured data, and/or the like. Again, the desired configuration will depend upon the context, environment, and
  • the DSFM controller may be executing a
  • PHP script implementing a Secure Sockets Layer (“SSL”) socket server via the information server, which listens to incoming communications on a server port to which a client may send data, e.g., data encoded in JSON format.
  • the PHP script may read the incoming message from the client device, parse the received JSON- encoded text data to extract information from the JSON-encoded text data into PHP script variables, and store the data (e.g., client identifying information, etc.) and/or extracted information in a relational database accessible using the Structured Query Language (“SQL").
  • SQL Structured Query Language
  • socket_bind ($sock, $address, $port) or die ( 'Could not bind to address');

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Devices For Executing Special Programs (AREA)
  • Stored Programmes (AREA)
  • Retry When Errors Occur (AREA)

Abstract

A Data Synchronization and Failover Management (DSFM) system monitors simultaneous execution of non-identical instances of a software application and may label as a particular result of the software application the earliest output corresponding to that result produced by one of the instances. The DSFM may label one of the instances as a primary instance and the other instances as secondary instances and, if the primary instance fails, may re-label one of the secondary instances that computed all of the operations associated with the last result produced prior to the failure of the primary instance, as a new primary instance.

Description

SYSTEMS AND METHODS FOR
DATA SYNCHRONIZATION AND FAILOVER MANAGEMENT
Cross-Reference to Related Applications
[0001 ] This application claims priority to and the benefit of U.S. Provisional Patent
Application No. 61/951,374, entitled "Data Synchronization and Failover Management
Apparatuses, Methods and Systems," which was filed on March, 11, 2014. This application also claims priority to and the benefit of U.S. Utility Application No. 14,644,674, of the same title, which was filed on March, 11, 2015. The subject matter of the present application is related to the co-pending U.S. Utility Application No. 14/644,606, filed March 11, 2015, which claims priority to: (a) U.S. Provisional Application No. 61/951,364, filed on March 11, 2014; and (b) U.S. Provisional Application No. 61/951,390, filed on March 11, 2014. The subject matter of the present application is also related to PCT International Application No. PCT/US2013/059558, filed on September 12, 2013. Each of the above-referenced related applications is incorporated herein by reference in its entirety.
Field of the Invention
[0002] This disclosure generally relates to runtime environments for execution of software applications and, in particular, to techniques for enhancing performance and reliability of a software application.
Background
[0003 ] Software programs and systems, generally referred to as software applications or applications, often perform mission critical tasks in various fields such as monitoring and control of medical systems, financial transactions, monitoring and control of industrial manufacturing, etc. An application performing a critical task fails sometimes, e.g., due to a software error. Via code analysis, testing, and repairs to the code, software errors can be avoided or at least minimized. Sometimes, however, the execution of a software application fails not due to a software error but due to an event in the environment in which the application is executed. For example, a disk or another memory from which the application accesses data may fail, a network link for accessing one or more components of the application and/or required data may fail, etc. Such environmental failures can cause a software application to fail.
[0004] In various fields, such as those described above, a software application is expected not only to deliver high performance, e.g., to generate required computational results as quickly as possible, but also to provide these results in a reliable manner. While software errors can be avoided or at least minimized, as described above, errors caused by environmental factors and/or hardware failures tend to be unpredictable. One way to improve reliability of the software application, therefore, is to execute simultaneously two instances of the software application. Even if one instance fails due to an environmental event, it is not very likely that at or about that moment of time an event would occur in the environment of the other instance, causing that instance to fail, as well. Therefore, the other instance, often called as a backup instance, may continue to perform the required computational tasks.
[0005] This redundancy-based approach presents some challenges, however. First, running two instances of the software application generally increases the cost of executing the software application in terms of required resources such as processors, servers, memory, networking interfaces, etc. Second, this approach is not highly scalable because another environmental event that causes a failure of the backup instance may occur. While two or more backup instances can be executed simultaneously, to increase redundancy and thus reliability further, this can also increase the cost of executing the software application even further.
[0006] For efficient execution of a software application, interpreted computer languages offer several benefits over their compiled counterparts, such as greater portability across different computer architectures. Running code in an interpreter can be dramatically slower, however, than running the same code compiled to a processor's native machine language. To overcome this disadvantage, many interpreters can improve performance by including just-in- time (JIT) compilation, in which at least a portion of the interpreter's bytecode is compiled to the processor's native code. The interpreter can then execute the native code instead of interpreting the bytecode for that portion of the program. This feature is provided in several interpreter runtimes, including the standard HotSpot implementation of the Java Virtual Machine (JVM) and Microsoft's Common Language Runtime (commonly known as .NET), and may offer performance comparable to traditional ahead-of-time (AIT) compiled languages.
[0007] Another performance improvement is possible with JIT compiled languages, where as the interpreter executes a particular bytecode (or another intermediate representation, or source code), the interpreter can gather profiling information about the executed code or at least a portion thereof, that enables a greater degree of optimization when the code or a portion thereof is compiled. This adaptive optimization is provided in the HotSpot JVM and can sometimes offer better performance than ahead-of-time compiled code. One major drawback of this technique is that the code or a portion thereof must be run many times (e.g., tens, hundreds, thousands, or even more times) using the interpreter to collect sufficient profiling information to optimize the compilation. During the profiling phase, the software application typically runs slower than a compiled version compiled using traditional compilation technique such as AIT compilation. Only after profiling of the code is completed the adaptive JIT may offer enhanced performance.
Summary
[0008] Embodiments of systems and methods described herein feature Data
Synchronization and Failover Management (DSFM), through which the reliability of a software application can be increased by facilitating simultaneous execution of several non-identical instances of the software application. While this can increase the cost of execution of the software application, unlike techniques based merely on redundancy, the non-identical instances can provide a performance enhancement. Specifically, each instance can be generated to optimize a different respective goal such as maximizing, minimizing, or utilizing according to a specified limit one or more resources such as memory, network interfaces, processing capacity, number of available processors, etc. Some instances may be optimized for execution using runtime information available from previous runs and/or by using just-in-time (JIT) compilation. Such instances can be generated by compiling the source code of the software application using different compilers and/or by using different compiler options that can optimize one or more specified goals, such as those described above.
[0009] As each instance is derived from substantially the same source code, each instance produces, in substance, the same results as any other instance, i.e., each instance is likely to produce the same results the software application is expected to produce. Different instances may be optimized differently, however, and, hence, may output one or more results in a sequence of results at different times during their respective execution, even though the execution of the various instances of the software application is initiated at or about the same time. If the software application is expected to produce a sequence of results, for each result, an implementation of a DSFM system can designate/label a corresponding output from an instance that produced the output before all other instances as the required result and may discard the outputs from other instances as duplicates. In general, different instances may first output different results. By designating/labelling the earliest produced respective outputs as the successive results of the software application, an implementation of the DSFM system can improve the overall performance of the software application.
[0010] Regardless of whether an implementation of DSFM system designates/labels or selects a particular output of a particular instance as a particular result of the software application, each instance performs all of the computations that are required to generate that result. These instances can be in different states because some instances, due to different respective optimizations thereof, may have performed additional computations that are not required to produce the particular result. Nevertheless, when all instances have completed the computations that are required to produce a particular result, an implementation of DSFM system considers these instances to be in synchronization or in sync.
[001 1 ] An implementation of DSFM system may designate/label one of these instances as a primary instance. Optionally, one implementation of DSFM system may designate/label the outputs of the primary instance as the results of the software application, and may discard the outputs of the one or more other instances, designated/labelled as secondary instance(s). If the primary instance fails after k results are produced, collectively by all of the instances, as described above, or by the primary instance alone, an implementation of DSFM system can designate/label one of the secondary instances as a new primary instance because, as described above, all of these instances are in sync, though not in an identical state, after the k results are produced. The (k+l)-th and one or more subsequent results may be produced by the secondary instance re-designated/re-labelled as the new primary instance.
[0012] Should the newly designated/labelled primary instance fail after, e.g.,
computation of n results, yet another secondary instance would be in sync, and an
implementation of DSFM system may re-designate/re-label that other secondary instance as the new primary instance. While the cost of executing a software application would generally increase with the number of instances, the different instances, due to different respective optimizations thereof, may have different performances associated with the production of different results, and the selection of the earliest output can increase the overall performance of the software application. Even though the various instances are non-identical, several implementations of a DSFM system can determine the instants at which the various instances are in sync, and can thus enable failover from one instance to another different instance, likely in a different state than that of the failed instance, without affecting the results produced, and can thus increase reliability of the software application.
[0013 ] Accordingly, in one aspect a method is provided for executing a software application expeditiously on at least one computer processor. The method includes
simultaneously executing several instances of the software application on one or more computer processors, where each instance is compiled according to a respective compiler option that is different from respective compiler options used to compile all other instances from the several instances. For each one of a first set of results to be produced by the software application, the method includes monitoring, corresponding to the result, a respective output generated by each instance. For each one of the first set of results to be produced by the application, the method also includes labelling from the monitored outputs the output that occurs earliest as the output of the application corresponding to the result, and labelling all other outputs as duplicates. In this way, each one of the first set of results is obtained from an instance that produced that particular result before all other instances, thereby speeding up a computing performance of the one or more computer processors in executing the software application.
[0014] In some embodiments, the several instances include a first instance and a second instance, and the compiler option for the first instance includes ahead-of-time (AIT) compilation. For example, the first instance may be compiled using AIT compilation. The compiler option for the second instance may include just-in-time (JIT) compilation. JIT compilation of the second instance may be based on, at least in part, runtime information obtained from one or more prior executions of the second instance. At least a portion of source code of the software application may be specified using a programming language that is at least partially interpreted.
[0015] In some embodiments, the several instances include a first instance, and the compiler option for the first instance can be one or more of unconstrained memory usage, minimization of memory usage, maximization of concurrent operations, and constrained concurrency of operations. Thus, in one example, the first instance may maximize parallel computation taking advantage of unconstrained memory usage. In another example, the first instance can minimize the memory usage, etc.
[0016] In some embodiments, the method further includes labelling one instance from the several instances as a primary instance, and labelling all other instances as secondary instances. The method may also include, for each result from a second plurality of results to be produced by the application, suppressing, corresponding to the result, respective outputs from the secondary instances. The method may also include identifying a failure of the primary instance after producing k results from the second plurality of results, where k > 1. The primary instance may then be labelled a failed instance. The method may further include selecting a secondary instance that executed logic associated with computation of each of the k results, and re-labelling the selected secondary instances as the primary instance, whereby the re-labelled primary instance produces (k+l)-th result. Because the selected secondary instance executed logic associated with the computation of each of the k results, the selected secondary instance is likely in sync with the primary instance prior to failure thereof. Therefore, the execution of the application via two or more instances can failover from one instance to another, generally without introducing substantial delays (such as those associated with restarting an application) and/or errors.
[0017] In another aspect, a method is provided for enabling failover for a software application. The method includes monitoring by a processor-based controller simultaneous executions of a primary instance of the software application and a first secondary instance of the application. The primary instance is compiled according to a first compiler option, and the first secondary instance is compiled according to a compiler option that is different from the first compiler option. The method also includes detecting a failure of the primary instance after production of k results of the software application, where k > 1. In addition, the method includes confirming that the first secondary instance has computed operations required to compute the k- th result, and labelling the first secondary instance as the primary instance. Because the first secondary instance computed the operations required to compute each of the k results, the first secondary instance is likely in sync with the primary instance prior to failure thereof. Therefore, the execution of the application via two or more instances can failover from one instance to another, generally without introducing substantial delays (such as those associated with restarting an application) and/or errors. [0018] The controller may suppress outputs of the first secondary instance that correspond to the k results, i.e., prior to failure of the instance labelled as the primary instance. The first compiler option may include just-in-time (JIT) compilation, and the compiler option used for the first secondary instance may include ahead-of-time (AIT) compilation. In some embodiments, the method further includes monitoring by the controller simultaneous execution of a second secondary instance of the application. The second secondary instance is compiled according to a compiler option that is different from both the first compiler option and the compiler option used to compile the first secondary instance. If the first secondary instance is not confirmed by the method to have computed the operations required to compute the k-th result, the method may include confirming that the second secondary instance has the computed operations required to compute the k-th result. The second secondary instance may then be labelled as the primary instance, permitting efficient and error free failover from the instance previously labelled as the primary instance to the second secondary instance, which is re-labelled as the primary instance.
[0019] In another aspect, a system for executing a software application expeditiously on at least one computer processor includes a first processor and a first memory in electrical communication with the first processor. The first memory includes instructions which, when executed by a processing unit that may include the first processor and/or a second processor, program the processing unit to simultaneously execute several instances of the software application on one or more computer processors. Each instance is compiled according to a respective compiler option that is different from respective compiler options used to compile all other instances from the several instances. For each one of a first set of results to be produced by the application, the instructions program the processing unit to monitor, corresponding to the result, a respective output generated by each instance. For each one of the first set of results to be produced by the application, the instructions also program the processing unit to label from the monitored outputs the output that occurs earliest as the output of the application
corresponding to the result, and to label all other outputs as duplicates. In this way, each one of the first set of results is obtained from an instance that produced that particular result before all other instances, thereby speeding up a computing performance of the one or more computer processors in executing the software application. In various embodiments, the instructions can program the processing unit to perform one or more of the method steps described above.
[0020] In another aspect, a system for enabling failover for a software application includes a first processor and a first memory in electrical communication with the first processor. The first memory includes instructions which, when executed by a processing unit that may include the first processor and/or a second processor, program the processing unit to monitor simultaneous executions of a primary instance of the software application and a first secondary instance of the application. The primary instance is compiled according to a first compiler option, and the first secondary instance is compiled according to a compiler option that is different from the first compiler option. The instructions also program the processing unit to detect a failure of the primary instance after production of k results of the software application, where k > 1. In addition, the instructions program the processing unit to confirm that the first secondary instance has computed operations required to compute the k-th result, and to label the first secondary instance as the primary instance. As such, the execution of the application via two or more instances can failover from one instance to another, generally without introducing substantial delays (such as those associated with restarting an application) and/or errors. In various embodiments, the instructions can program the processing unit to perform one or more of the method steps described above.
[0021 ] In another aspect, an article of manufacture that includes a non-transitory storage medium has stored therein instructions which, when executed by a processing unit program the processing unit, which is in electronic communication with a memory, to simultaneously execute several instances of the software application on one or more computer processors. Each instance is compiled according to a respective compiler option that is different from respective compiler options used to compile all other instances from the several instances. For each one of a first set of results to be produced by the application, the instructions program the processing unit to monitor, corresponding to the result, a respective output generated by each instance. For each one of the first set of results to be produced by the application, the instructions also program the processing unit to label from the monitored outputs the output that occurs earliest as the output of the application corresponding to the result, and to label all other outputs as duplicates. In various embodiments, the instructions can program the processing unit to perform one or more of the method steps described above.
[0022] In another aspect, an article of manufacture that includes a non-transitory storage medium has stored therein instructions which, when executed by a processing unit program the processing unit, which is in electronic communication with a memory, to monitor simultaneous executions of a primary instance of the software application and a first secondary instance of the application. The primary instance is compiled according to a first compiler option, and the first secondary instance is compiled according to a compiler option that is different from the first compiler option. The instructions also program the processing unit to detect a failure of the primary instance after production of k results of the software application, where k > 1. In addition, the instructions program the processing unit to confirm that the first secondary instance has computed operations required to compute the k-th result, and to label the first secondary instance as the primary instance. In various embodiments, the instructions can program the processing unit to perform one or more of the method steps described above.
[0023 ] One technical effect of various embodiments of the present invention is that the overall performance of a software application that is expected to produce a sequence of results can be increased by selecting for each result the earliest output from several instances simultaneously producing outputs corresponding to that result. The times at which the different instances may produce outputs corresponding to a particular result may be different due to differences in the manner in which the different instances are compiled. Some instances may initially produce outputs slower than some other instances, but may later produce outputs faster than those instances. By selecting the earliest output for each result, effectively, the software application is executed through the instances that were the fastest in producing outputs respectively corresponding to different results, thereby speeding up execution of the overall software application.
[0024] Another technical effect of various embodiments of the present invention is that while increasing performance as described above, the different instances can be maintained in synchronization, though not in the exact same state, at the computation of each one of a series of results to be produced by the software application. Therefore, if one instances fails after the production of one or more results, another instance, likely the fastest in producing the next result among those that have not failed, can be used to produce the next result. Thus, a safe, i.e., generally error free failover can be achieved without having to incur excessive delays, such as those associated with restarting the application, while enhancing the overall performance of the software application.
[0025] These and other objects, along with advantages and features of the embodiments disclosed herein, will become more apparent through reference to the following description, the accompanying drawings, and the claims. Furthermore, it is to be understood that the features of the various embodiments described herein are not mutually exclusive and can exist in various combinations and permutations.
Brief Description of the Drawings
[0026] In the drawings, like reference characters generally refer to the same parts throughout the different views. Also, the drawings are not necessarily to scale, emphasis instead generally being placed upon illustrating the principles of the invention. In the following description, various embodiments of the present invention are described with reference to the following drawings, in which:
[0027] FIGURE 1 illustrates the uses of various embodiments of a DSFM system;
[0028] FIGURE 2 depicts a datagraph diagram illustrating failover from a primary instance of a software application to a secondary instance, using an embodiment of a DSFM system;
[0029] FIGURE 3 depicts a logic flow diagram illustrating a transition from one instance of a software application to another instance, using an embodiment of a DSFM system;
[0030] FIGURES 4 and 5 schematically illustrate performance enhancement of a software application using an embodiment of a DSFM system; and [0031 ] FIGURE 6 schematically depicts a DSFM controller, according to one embodiment.
Detailed Description
[0032] With reference to FIGURE 1, a user 101 may wish to execute a particular software application. A Data Synchronization and Failover Management (DSFM) system 102 can execute two instances of the software application, one designated/labelled as a primary instance and another one designated/labelled as a secondary instance. The primary instance may fail, e.g., due to hardware failure, networking error, etc., and execution may be transferred to the secondary instance (also called a backup instance). In some embodiments, the secondary instance may not be in the same exact state as the primary one, for example, because even though the primary and the secondary instances are derived from identical source code, the two instances may be compiled differently. Therefore, the secondary instance may not follow the same code path as that of the primary instance. As such, the execution of the secondary instance can be different compared to that of the primary instance, resulting in, for example, different and/or potentially subpar results, e.g., in terms of execution speed.
[0033 ] For example, the primary and secondary instances, even if they were in identical states at the start, may drift apart during execution, and even when they are in sync, i.e., generally implementing the same overall logic, the two instances may not be in exactly the same state. For example, in some software systems that are coded in interpreted or partially interpreted languages such as, but not limited to Java, a just-in-time (JIT) compilation can translate a bytecode code into a machine code, while searching for an optimal code path to follow during execution. If JIT compilation is used to generate either the primary or the secondary instance, but not both, at a particular time the primary and secondary instances may not execute exactly the same instructions. As an example, consider a code segment:
If (eval (condition) == true)
x = f 1 (A) ;
else
x = f2 (A) ;
output (x) ;
One instance (denoted Instance A) of this code segment, compiled using one compiler, may first evaluate the condition, then determine if the condition is true, and may then compute f 1 or £2 accordingly, to produce the result x.
[0034] The same compiler or another compiler may have knowledge that evaluation of the condition usually takes a long time (e.g., a few milliseconds), and the evaluation of fl and £2 also takes some time (e.g., a few milliseconds), but that all three computations are not dependent on each other. Therefore, another instance (denoted Instance B) of the same code segment, compiled using the knowledge about execution times, using the other compiler or a different option of the same compiler, may compute both fl and £2 while the evaluation of the condition is ongoing. After the evaluation is completed, Instance B may readily choose between the results of fl and £2, thereby producing the output faster than Instance A would. Thus, at a particular moment in time, Instance A of the code segment may be evaluating the condition only, while Instance B may be additionally computing fl and £2, as well.
[0035] In yet another example, a compiler used to generate another instance (denoted
Instance C) of the code segment may have knowledge that more often than not, the condition is false. Therefore, Instance C may compute £2 only and not fl, while the evaluation of the condition is underway, and compute fl only if the condition is determined to be true. Thus, the computation of x can be speeded up relative to that by Instance A, which was compiled without using any additional knowledge, in a majority of situations but not in all of them. At a particular moment in time Instance A may be evaluating the condition only, while Instance C may be evaluating both the condition and f2. Thus, even though, instances A, B, and C generally implement the same logic that is specified by the code segment, at a particular moment of time, each of these instances may execute different instructions.
[0036] If two or more such instances compiled using different compilation techniques, different compilers, and/or different compiler options execute simultaneously, the one or more instances generally lagging in the production of results of the application relative to another instance, may be configured to suppress their respective outputs, e.g., to avoid duplication of results. To illustrate, during execution, the primary instance (e.g., Instance B) may have generated a particular output (e.g., result x) and, hence, the secondary instance (e.g., Instances A or C) may not produce a duplicate of that output, even when the computations required to produce that output are performed by the instances A and C. In some embodiments, the instance designated/labelled to produce outputs thereof as results of the application may be called a primary instance (e.g., Instance B), and the one or more other instances (e.g., Instance A and Instance C) may be called secondary instance(s). By having the secondary instance(s) perform the operations associated with each result to be produced by the application and by suppressing only the outputs of the secondary instance(s), the secondary instance(s) are maintained in sync with the primary instance and in a state as close to the state of the primary as possible.
[0037] In some implementations, the JIT compilation for the primary and secondary instances may generate different code paths with different instructions for the primary and secondary instances, as described above using the example code segment. In some implementations, the primary and secondary instances may have different code paths because different kinds of compilers (e.g., JIT and ahead-of-time (AIT)) are used to compile the primary and secondary instances. In some implementations, the same compiler may be used to compile both the primary instance and the secondary instance, but different compiler options may be used during respective compilations. Examples of compiler options include, but are not limited to, minimizing memory usage, unconstrained memory usage, maximizing concurrent and/or partially overlapping operations (e.g., using parallel processors, several threads, etc.), limiting the number of concurrent and/or partially overlapping operations to a specified limit, etc. In some implementations, a primary instance is detected to have failed and the execution is switched to a secondary instance. The secondary instance execution may follow a different code path and, hence, the performance and efficiency of the secondary instance may not match that of the primary instance, e.g., 104.
[0038] Various embodiments of a DSFM system describe herein can take advantage of an option in some JIT runtimes using which the entire program may be compiled ahead of time. For example, in the HotSpot JVM, the -Xcomp command-line option can cause the runtime to compile every executed method immediately rather than subjecting the method to the relatively slower interpretation and profiling phases. In .NET, the NGen utility can compile bytecode programs to native code at the time of installation rather than doing so every time the program is run. While these options may differ in their operation, they both generally have the same effect of transforming JIT into ahead-of-time compilation.
[0039] In some embodiments, two instances of a single bytecode program are executed simultaneously. Simultaneously generally means with at least a partial overlap in the respective times of execution. The first instance uses the optional ahead-of-time compilation while the second is run by the standard adaptive JIT runtime. Both instances are supplied with identical inputs and they may produce identical outputs, but at different speeds. In general, initially the first instance is significantly faster as it uses compiled code while the second instance continues to profile the code in the interpreter. As the second instance gradually compiles the program, its performance typically increases and eventually may surpass the performance of the first instance, in part due to the greater optimization available with the adaptive JIT compiler.
[0040] The different executions of the two instances can be represented as a single execution of a software application. To this end, the respective outputs of the two instances may be merged via a filter process. In some embodiments, the filter process collects the output messages from the two instances, but only issues an output message in response to the first or earlier produced of the merged messages, i.e., a message produced by a faster instance, and the duplicate messages produced by the other relatively slower instance are discarded. As each instance is expected to produce the same output messages in the same order, the filter can effectively issue messages from the faster one of the two instances. In effect, the combination of the two instances and the filter operates as a single instance with both the faster initial performance of ahead-of-time compilation and the faster long-term performance of adaptive JIT. This technique can be extended to more than two instances, for example, as described below with reference to FIGS. 4 and 5.
[0041 ] With reference to FIGURE 2, in some implementations, users/clients 201 may request to execute an application by, for example, running a piece of code on a given system, e.g., 205. In some implementations, there may be a configuration that designates/labels, e.g., 202, one instance of the application as primary 203, and the rest as secondaries 204. In some embodiments, to keep the exact same record between the different instances of code executions (e.g., primary and secondary), the backup application uses the same code path as the primary instance. But, in some embodiments, some steps in the executions may be slightly different. For example, a primary instance and a secondary instance may follow the exact same code path except for the primary instance generating an output after the execution, e.g., 207, while the secondary does not, e.g., 208. In some embodiments, the output generation processing by the backup application may run through the full execution path of the primary instance up to but not including the point of publishing the output, resulting in primary and secondary instances that are kept as identically close to each other as possible. In some embodiments, the primary and the secondary instances may not end up in an exactly identical state, however. For example, in systems that are coded in java, if the primary and secondary instances follow the exact same code execution paths up to but not including the publishing of the message outputs of the codes, they may have the complete message stream in common and may be in sync with each other, but will not be in precisely the same state. For example, execution requests 206a to the primary instance may specify that a final output needs to be produced. For example, execution requests 206a and 206b may be (Secure) Hypertext Transfer Protocol ("HTTP(S)") POST messages including a "write output" instruction in the form of data formatted according to the XML. An example listing of an application execution request 206a and 206b, substantially in the form of a HTTP(S) POST message including XML-formatted data, is provided below:
POST /execute_request .php HTTP/ 1.1
Host: www.primary.com
Content-Type: Application/XML
Content-Length: 867
<?XML version = "1.0" encoding = "UTF-8"?>
<execute_request>
<request_id> fdgsbv633dg </instruct_id>
<timestamp> 2015-05-13 15 : 43 : 44</timestamp> <application_type> primary </application_type>
<prmry_id> PRMRY_1 </prmry_id>
// <application_type> backup </application_type>
// <backup_size> n=7 <backup_size>
// <backup_id> SCNDRY_1 </backup_id>
// <backup_id> SCNDRY_2 </backup_id>
<application_inputs>
<init_val_l> . </ init_val
<init_val_2> . </ init val
</application_inputs>
<application_name> trading_analytics.exe </application_name>
<Output_msg> TRUE </output_msg>
/ /<Output_msg> FALSE </output_msg>
<application_output>
<format> ... </ format>
</application_output>
</execute_request>
[0042] In some implementations, to improve runtime performance of codes, one may utilize just-in-time (JIT) compilation capabilities of a system, and convert the codes into machine codes. In some implementations, the JIT compiler may initiate the optimization of the codes as part of the compilation, whether it is the primary, e.g., 207, or the secondary, e.g., 208. For example, JIT compilation may consolidate duplicative code lines into succinct ones, and/or remove extraneous code paths to more efficiently optimize the paths that are being most used. For example, if a code path has been used more than a predetermined and/or dynamically determined threshold number of times, in some embodiments, it may be given a higher priority and favored over other code paths with less usage. In some embodiments, the secondary instance that may run through the full execution path of the primary instance up to the point of publishing the output may have a code path that is not the same as that of the primary instance, because the code of the secondary instance leading up to the point of publishing may not be optimized similarly as the corresponding code of the primary instance.
[0043 ] In some embodiments, the secondary and/or standby application may become a primary instance when the original primary and/or active application is determined to have failed. For example, a server 204 may monitor the performance of the primary instance and initiate application failover when it detects system and/or application failure on the part of the original primary instance, e.g., 209. Once the original primary instance is determined to have failed, in some embodiments, the server may designate/label a secondary instance of the application into a new primary instance and direct the codes for execution to the newly primary instance, e.g., 210. For example, the secondary server 204 may generate a (Secure) Hypertext Transfer Protocol ("HTTP(S)") POST message including a switch instruction in the form of data formatted according to the XML. An example listing of a failover instruction 210, substantially in the form of a HTTP(S) POST message including XML-formatted data, is provided below:
POST /switch_instruction . php HTTP/1.1
Host: www.switch.com
Content-Type: Application/XML
Content-Length: 867
<?XML version = "1.0" encoding = "UTF-8 " ?>
<routing_instruct>
<instruct_id> 25jh23jlu0s </instruct_id>
<timestamp> 2015-02-22 15 : 22 : 44</timestamp>
<instructor_id> SCNDRY_2 </ instructor_id>
<switch_reason> PRMRY_NO_RSPNS </ switch_reason>
<designation_instr>
<switch> primary = SCNDRY_2 </switch>
<duration> INDFNT </duration>
//<duration> PRMRY_MSG </duration>
</designation_instr> </ routing_instruct>
[0044] In some embodiments, after the instruction, code execution may then be directed to the application with the optimal code path where the "publish" or "write" code of the application is cold, i.e., not optimized, e.g., 211. For example, code execution request 211 may be a (Secure) Hypertext Transfer Protocol ("HTTP(S)") POST message including a "write output" instruction in the form of data formatted according to the XML as described above with reference to FIGURE 2. In some embodiments, the performance of the code execution may be inferior compared to the previously primary one, as some parts of the code path are not optimized. For example, in systems coded in java, and once the switch is made to the secondary instance with a code path that has a cold "write" code, java may run through the predetermined and/or dynamically determined threshold number of iterations of the "write" code of the code path to optimize, i.e., "warm up" the code path, and in the process slow the application down for the duration of the warm up period, resulting in degradation in performance compared to the primary instance before the switch e.g., 212.
[0045] In some implementations, the DSFM system may allow the secondary and/or standby applications to execute to the end of the full code path including the publishing of the message outputs of the codes. In some implementations, this allows the primary and the secondary instances to maintain identical states, and in the event of failure with the primary instance, the secondary instance may step in and proceed with the code execution along the same optimized code path as the previously primary instance would have taken and hence without degradation in performance, e.g., 213. For example, the secondary instance may allow the message processing path to execute to the end of the java segment and have java write the message output to the next step, but then stop the path before the next step begins. In these embodiments, the full java path may be executed by both the primary and the backup
applications, and both applications may maintain an identical state. In some embodiments, if the primary needs to failover to the secondary instance, the secondary instance may pick up immediately where the primary instance left off with no degradation in performance since the secondary instance is both optimized by java and "warmed up" like the primary instance.
[0046] FIGURE 3 shows a logic flow diagram illustrating examples of transforming a request for application execution via an embodiment of a DSFM component into an optimized and efficient execution of the application. In some embodiments, a user may wish to execute an application, e.g., 301, and initiate the execution by running a piece of code of the application. In some implementations, this may be the first instance of the running of the code, and the compiling of the code may be warranted, e.g., 302. For example, a java source code translated into a bytecode may be compiled by a JIT compiler into a machine code, e.g., 303. In some embodiments, the compilation may be done dynamically and/or it may be done to just a piece of the full code (e.g., to the method of the code that was called, etc.). Once the application starts executing, e.g., 304, in some embodiments, java may start monitoring the running of the code to optimize the execution, e.g., 305. For example, java may wait for a few number of iterations before identifying methods, functions, etc., that are frequently called and/or used as the "hot spots", e.g., 306. In some implementations, once the application has executed enough number of times to determine these hot spots, the hot spots may be singled out for further optimization, e.g., 309. For example, these methods, functions, etc., may be made more efficient by consolidating commands, discarding code elements, etc., to improve efficiency and speed in executing the application. In some implementations, java may also wait for a number of iterations before identifying code paths that are frequently used, e.g., 307, and optimize/"prime" the application for improved efficiency by removing extraneous code paths that are infrequently used, e.g., 310. For example, after a path has been executed 10,000 times, it may receive higher priority, while other paths that are infrequently used may be discarded in favor of the higher priority path. In some implementations, once hot spots are optimized, and high priority code paths are identified, the execution of the application may become more efficient, e.g., 311.
[0047] FIGURE 4 shows block diagrams illustrating an exemplary DSFM system providing application optimization, synchronization and failover by virtue of a redundancy of application processes. In some implementations, upon a request to run an application, the DSFM system may initiate the execution of at least two instances of the application, e.g., 401a-n (equivalently two or more identical applications). In some embodiments, there may not be any status designation/labelling of these instances of the applications as primary and
secondary/backups, and each application instance may execute independently to produce identical or nearly identical message outputs that are written to a messaging bus/wire 406. In some embodiments, minor variations in systems processing (e.g., software, hardware, etc.) may cause these message outputs 402 produced by two or more instances of same application (i.e., identical applications) to be written to the wire non-simultaneously. In some implementations, a sequencer may process the arriving messages and classify one output as the message output of the application and the rest as duplicates. For example, a sequencer 403 may designate/label one message output written to the wire by one of two or more instances of an application as the message output of the application to be kept, and label (and consequently, for example, discard) the rest of the message outputs coming from the slower instances of the applications as duplicates. In some embodiments, the sequencer may utilize the time of arrival of the messages as the criteria for choosing which messages to keep and which messages to label as duplicates. For example, the sequencer may pick the first message to be written to the wire as the message output of the application and discard the rest, e.g., 404. In some implementations, the sequencer may utilize other criteria instead of or in combination with the time of arrival to determine the message that should be kept as the message output of the application. For example, in some embodiments, the criteria may include the time of arrival of the message, the size of the message, etc. For example, the sequencer may employ the criterion that the message that is kept as the output of the application is the first message that arrives whose size is less than some threshold number of bytes in size (and/or the smallest in size, etc).
[0048] In some embodiments, with two or more identical or nearly identical applications executing, the messages that are retained by the sequencer may come from different applications, as which application "wins out" in writing out a message varies message-by-message. For example, with reference to FIGURE 5, the final message output of executing applications may be pieced together by the sequencer from the message outputs of the multiple identical or nearly identical applications. For example, with N applications executing, application D's message may be the first to arrive out of a first batch of N messages, e.g., 501. In a second batch of N messages, another application's (say application K's) message may be the first to arrive at the sequencer, e.g., 502. In such embodiments, the sequencer 504 may piece together the message from application D in the first batch, followed by the message from application K in the second batch, etc., to arrive at the final message output of the application, e.g., 505.
[0049] In such implementations where multiple identical or nearly identical applications are executed, the redundancy may cause message traffic on the messaging bus/wire. For example, with N identical or nearly identical applications running, there would be N identical or nearly identical message outputs, resulting in increased message traffic for the wire. Conversely, the redundancy may be utilized for performance optimization as the system reaps the benefit of obtaining message outputs from the fastest applications as described above. In some
implementations, the redundancy may provide a fail safe mechanism in cases where one or more applications fail, e.g., 405. In such implementations, there may not be a need to manually and/or automatically intervene, as there is one or more other applications executing, and message outputs may be obtained from these one or more applications, e.g., 406.
[0050] Thus, various embodiments described herein can increasing performance of code in interpreted and/or other languages, e.g., with optional just-in-time (JIT) compiled runtimes. Adaptive JIT compilers can increase long-term performance compared to ahead-of-time and/or simple JIT compilers, at the cost of a period of slower initial performance while the code is interpreted and profiled to enhance the later compilation phase. By running the same code in parallel on two or more runtimes as two or more non-identical instances, the benefits of optimized JIT compilation without sacrificing initial performance during the interpreted phase can be achieved.
DSFM Controller
[0051 ] FIGURE 6 shows a block diagram illustrating examples of a DSFM controller
601 In this embodiment, the DSFM controller 601 may serve to aggregate, process, store, search, serve, identify, instruct, generate, match, and/or facilitate interactions with a computer through various technologies, and/or other related data.
[0052] Users, e.g., 633a, which may be people and/or other systems, may engage information technology systems (e.g., computers) to facilitate information processing. In turn, computers employ processors to process information; such processors 603 may be referred to as central processing units (CPU). One form of processor is referred to as a microprocessor. CPUs use communicative circuits to pass binary encoded signals acting as instructions to enable various operations. These instructions may be operational and/or data instructions containing and/or referencing other instructions and data in various processor accessible and operable areas of memory 629 (e.g., registers, cache memory, random access memory, etc.). Such
communicative instructions may be stored and/or transmitted in batches (e.g., batches of instructions) as programs and/or data components to facilitate desired operations. These stored instruction codes, e.g., programs, may engage the CPU circuit components and other
(mother)board(s) and/or system components to perform desired operations. One type of program is a computer operating system, which, may be executed by CPU on a computer; the operating system enables and facilitates users to access and operate computer information technology and resources. Some resources that may be employed in information technology systems include: input and output (I/O) mechanisms through which data may pass into and out of a computer; memory storage into which data may be saved; and processors by which information may be processed. These information technology systems may be used to collect data for later retrieval, analysis, and manipulation, which may be facilitated through a database program. These information technology systems provide interfaces that allow users to access and operate various system components.
[0053 ] In one embodiment, the DSFM controller 601 may be connected to and/or communicate with entities such as, but not limited to: one or more users from user input devices 611; peripheral devices 612; an optional cryptographic processor device 628; and/or a communications network 613. For example, the DSFM controller 601 may be connected to and/or communicate with users, e.g., 633a, operating client device(s), e.g., 633b, including, but not limited to, personal computer(s), server(s) and/or various mobile device(s) including, but not limited to, cellular telephone(s), smartphone(s) (e.g., iPhone®, Blackberry®, Android OS-based phones etc.), tablet computer(s) (e.g., Apple iPad™, HP Slate™, Motorola Xoom™, etc.), eBook reader(s) (e.g., Amazon Kindle™, Barnes and Noble's Nook™ eReader, etc.), laptop
computer(s), notebook(s), netbook(s), gaming console(s) (e.g., XBOX Live™, Nintendo® DS, Sony PlayStation® Portable, etc.), portable scanner(s), and/or the like.
[0054] Networks are commonly thought to include the interconnection and interoperation of clients, servers, and intermediary nodes in a graph topology. It should be noted that the term "server" as used throughout this application refers generally to a computer, other device, program, or combination thereof that processes and responds to the requests of remote users across a communications network. Servers serve their information to requesting "clients." The term "client" as used herein refers generally to a computer, program, other device, user and/or combination thereof that is capable of processing and making requests and obtaining and processing any responses from servers across a communications network. A computer, other device, program, or combination thereof that facilitates, processes information and requests, and/or furthers the passage of information from a source user to a destination user is commonly referred to as a "node." Networks are generally thought to facilitate the transfer of information from source points to destinations. A node specifically tasked with furthering the passage of information from a source to a destination is commonly called a "router." There are many forms of networks such as Local Area Networks (LANs), Pico networks, Wide Area Networks (WANs), Wireless Networks (WLANs), etc. For example, the Internet is generally accepted as being an interconnection of a multitude of networks whereby remote clients and servers may access and interoperate with one another.
[0055] The DSFM controller 601 may be based on computer systems that may include, but are not limited to, components such as: a computer systemization 602 connected to memory 629.
[0056] A computer system 602 typically includes a clock 630, central processing unit
("CPU(s)" and/or "processor(s)" (these terms are used interchangeably throughout the disclosure unless noted to the contrary)) 603, a memory 629 (e.g., a read only memory (ROM) 606, a random access memory (RAM) 605, etc.), and/or an interface bus 607, and most frequently, although not necessarily, are all interconnected and/or communicating through a system bus 604 on one or more (mother)board(s) 602 having conductive and/or otherwise transportive circuit pathways through which instructions (e.g., binary encoded signals) may travel to effectuate communications, operations, storage, etc. The computer systemization may be connected to a power source 686; e.g., optionally the power source may be internal. Optionally, a cryptographic processor 626 and/or transceivers (e.g., ICs) 674 may be connected to the system bus. In another embodiment, the cryptographic processor and/or transceivers may be connected as either internal and/or external peripheral devices 612 via the interface bus I/O. In turn, the transceivers may be connected to antenna(e) 675, thereby effectuating wireless transmission and reception of various communication and/or sensor protocols; for example the antenna(e) may connect to: a Texas Instruments WiLink WL1283 transceiver chip (e.g., providing 802.1 In, Bluetooth 3.0, FM, global positioning system (GPS) (thereby allowing a DSFM controller to determine its location)); Broadcom BCM4329FKUBG transceiver chip (e.g., providing 802.1 In, Bluetooth 2.1 + EDR, FM, etc.), BCM28150 (HSPA+) and BCM2076 (Bluetooth 4.0, GPS, etc.); a Broadcom BCM4750IUB8 receiver chip (e.g., GPS); an Infineon Technologies X-Gold 618-PMB9800 (e.g., providing 2G/3G HSDPA/HSUPA communications); Intel's XMM 7160 (LTE & DC- HSPA), Qualcom's CDMA(2000), Mobile Data/Station Modem, Snapdragon; and/or the like. The system clock may have a crystal oscillator and generates a base signal through the computer systemization's circuit pathways. The clock may be coupled to the system bus and various clock multipliers that will increase or decrease the base operating frequency for other components interconnected in the computer systemization. The clock and various components in a computer systemization drive signals embodying information throughout the system. Such transmission and reception of instructions embodying information throughout a computer systemization may be referred to as communications. These communicative instructions may further be transmitted, received, and the cause of return and/or reply communications beyond the instant computer systemization to: communications networks, input devices, other computer systemizations, peripheral devices, and/or the like. It should be understood that in alternative embodiments, any of the above components may be connected directly to one another, connected to the CPU, and/or organized in numerous variations employed as exemplified by various computer systems.
[0057] The CPU may include at least one high-speed data processor adequate to execute program components for executing user and/or system-generated requests. Often, the processors themselves will incorporate various specialized processing units, such as, but not limited to: floating point units, integer processing units, integrated system (bus) controllers, logic operating units, memory management control units, etc. and even specialized processing sub-units like graphics processing units, digital signal processing units, and/or the like. Additionally, processors may include internal fast access addressable memory, and be capable of mapping and addressing memory 629 beyond the processor itself; internal memory may include, but is not limited to: fast registers, various levels of cache memory (e.g., level 1, 2, 3, etc.), RAM, etc. The processor may access this memory through the use of a memory address space that is accessible via instruction address, which the processor can construct and decode allowing it to access a circuit path to a specific memory address space having a memory state/value. The CPU may be a microprocessor such as: AMD's Athlon, Duron and/or Opteron; ARM's classic (e.g.,
ARM7/9/11), embedded (Coretx-M/R), application (Cortex-A), and secure processors; IBM and/or Motorola's DragonBall and PowerPC; IBM's and Sony's Cell processor; Intel's Atom, Celeron (Mobile), Core (2/Duo/i3/i5/i7), Itanium, Pentium, Xeon, and/or XScale; and/or the like processor(s). The CPU interacts with memory through instruction passing through conductive and/or transportive conduits (e.g., (printed) electronic and/or optic circuits) to execute stored instructions (i.e., program code). Such instruction passing facilitates communication within the DSFM controller and beyond through various interfaces. Should processing requirements dictate a greater amount of speed and/or capacity, distributed processors (e.g., Distributed DSFM system/controller), mainframe, multi-core, parallel, and/or super-computer architectures may similarly be employed. Alternatively, should deployment requirements dictate greater portability, smaller mobile devices (e.g., smartphones, Personal Digital Assistants (PDAs), etc.) may be employed.
[0058] Depending on the particular implementation, features of the DSFM system may be achieved by implementing a microcontroller such as CAST'S R8051XC2 microcontroller; Intel's MCS 51 (i.e., 8051 microcontroller); and/or the like. Also, to implement certain features of the DSFM system, some feature implementations may rely on embedded components, such as: Application-Specific Integrated Circuit ("ASIC"), Digital Signal Processing ("DSP"), Field Programmable Gate Array ("FPGA"), and/or the like embedded technology. For example, any of the DSFM component collection (distributed or otherwise, e.g. IMAS 341, etc.) and/or features may be implemented via the microprocessor and/or via embedded components; e.g., via ASIC, coprocessor, DSP, FPGA, and/or the like. Alternately, some implementations of the DSFM system may be implemented with embedded components that are configured and used to achieve a variety of features or signal processing.
[0059] Depending on the particular implementation, the embedded components may include software solutions, hardware solutions, and/or some combination of both
hardware/software solutions. For example, DSFM system features discussed herein may be achieved through implementing FPGAs, which are a semiconductor devices containing programmable logic components called "logic blocks", and programmable interconnects, such as the high performance FPGA Virtex series and/or the low cost Spartan series manufactured by Xilinx. Logic blocks and interconnects can be programmed by the customer or designer, after the FPGA is manufactured, to implement any of the DSFM system features. A hierarchy of programmable interconnects allow logic blocks to be interconnected as needed by the DSFM system designer/administrator, somewhat like a one-chip programmable breadboard. An FPGA's logic blocks can be programmed to perform the operation of basic logic gates such as AND, and XOR, or more complex combinational operators such as decoders or simple mathematical operations. In most FPGAs, the logic blocks also include memory elements, which may be circuit flip-flops or more complete blocks of memory. In some circumstances, the DSFM system may be developed on regular FPGAs and then migrated into a fixed version that more resembles ASIC implementations. Alternate or coordinating implementations may migrate one or more DSFM controller features to a final ASIC instead of or in addition to FPGAs. Depending on the implementation all of the aforementioned embedded components and microprocessors may be considered the "CPU" and/or "processor" for the DSFM system.
[0060] The power source 686 may be of any standard form for powering small electronic circuit board devices such as the following power cells: alkaline, lithium hydride, lithium ion, lithium polymer, nickel cadmium, solar cells, and/or the like. Other types of AC or DC power sources may be used as well. In the case of solar cells, in one embodiment, the case provides an aperture through which the solar cell may capture photonic energy. The power cell 686 is connected to at least one of the interconnected subsequent components of the DSFM system thereby providing an electric current to all their interconnected components. In one example, the power source 686 is connected to the system bus component 604. In an alternative embodiment, an outside power source 686 is provided through a connection across the I/O 608 interface. For example, a USB and/or IEEE 1394 connection carries both data and power across the connection and is therefore a suitable source of power.
[0061 ] Interface bus(ses) 607 may accept, connect, and/or communicate to a number of interface adapters, frequently, although not necessarily in the form of adapter cards, such as but not limited to: input output interfaces (I/Os) 608, storage interfaces 609, network interfaces 610, and/or the like. Optionally, cryptographic processor interfaces 627 similarly may be connected to the interface bus. The interface bus provides for the communications of interface adapters with one another as well as with other components of the computer systemization. Interface adapters are adapted for a compatible interface bus. Interface adapters may connect to the interface bus via an expansion and/or slot architecture. Various expansion and/or slot architectures that be employed, such as, but not limited to: Accelerated Graphics Port (AGP), Card Bus, ExpressCard, (Extended) Industry Standard Architecture ((E)ISA), Micro Channel Architecture (MCA), NuBus, Peripheral Component Interconnect (Extended) (PCI(X)), PCI Express, Personal Computer Memory Card International Association (PCMCIA), Thunderbolt, and/or the like.
[0062] Storage interfaces 609 may accept, communicate, and/or connect to a number of storage devices such as, but not limited to: storage devices 614, removable disc devices, and/or the like. Storage interfaces may employ connection protocols such as, but not limited to: (Ultra) (Serial) Advanced Technology Attachment (Packet Interface) ((Ultra) (Serial) ATA(PI)), (Enhanced) Integrated Drive Electronics ((E)IDE), Institute of Electrical and Electronics Engineers (IEEE) 1394, Ethernet, fiber channel, Small Computer Systems Interface (SCSI), Thunderbolt, Universal Serial Bus (USB), and/or the like.
[0063 ] Network interfaces 610 may accept, communicate, and/or connect to a communications network 613. Through a communications network 613, the DSFM controller is accessible through remote clients 633b (e.g., computers with web browsers) by users 633a. Network interfaces may employ connection protocols such as, but not limited to: direct connect, Ethernet (thick, thin, twisted pair 10/100/1000 Base T, and/or the like), Token Ring, wireless connection such as IEEE 802.1 la-x, and/or the like. Should processing requirements dictate a greater amount speed and/or capacity, distributed network controllers (e.g., Distributed DSFM system), architectures may similarly be employed to pool, load balance, and/or otherwise increase the communicative bandwidth required by the DSFM controller. A communications network may be any one and/or the combination of the following: a direct interconnection; the Internet; a Local Area Network (LAN); a Metropolitan Area Network (MAN); an Operating Missions as Nodes on the Internet (OMNI); a secured custom connection; a Wide Area Network (WAN); a wireless network (e.g., employing protocols such as, but not limited to a Wireless Application Protocol (WAP), I-mode, and/or the like); and/or the like. A network interface may be regarded as a specialized form of an input output (I/O) interface. Further, multiple network interfaces 610 may be used to engage with various communications network types 613. For example, multiple network interfaces may be employed to allow for the communication over broadcast, multicast, and/or unicast networks.
[0064] Input Output interfaces (I/Os) 608 may accept, communicate, and/or connect to user input devices 611, peripheral devices 612, cryptographic processor devices 628, and/or the like. I/Os may employ connection protocols such as, but not limited to: audio: analog, digital, monaural, RCA, stereo, and/or the like; data: Apple Desktop Bus (ADB), Bluetooth, IEEE 1394a-b, serial, universal serial bus (USB); infrared; joystick; keyboard; midi; optical; PC AT; PS/2; parallel; radio; video interface: Apple Desktop Connector (ADC), BNC, coaxial, component, composite, digital, DisplayPort, Digital Visual Interface (DVI), high-definition multimedia interface (HDMI), RCA, RF antennae, S-Video, VGA, and/or the like; wireless transceivers: 802.1 la/b/g/n/x; Bluetooth; cellular (e.g., code division multiple access (CDMA), high speed packet access (HSPA(+)), high-speed downlink packet access (HSDPA), global system for mobile communications (GSM), long term evolution (LTE), WiMax, etc.); and/or the like. One output device may be a video display, which may take the form of a Cathode Ray Tube (CRT), Liquid Crystal Display (LCD), Light Emitting Diode (LED), Organic Light Emitting Diode (OLED), Plasma, and/or the like based monitor with an interface (e.g., VGA, DVI circuitry and cable) that accepts signals from a video interface. The video interface composites information generated by a computer systemization and generates video signals based on the composited information in a video memory frame. Another output device is a television set, which accepts signals from a video interface. Often, the video interface provides the composited video information through a video connection interface that accepts a video display interface (e.g., an RCA composite video connector accepting an RCA composite video cable; a DVI connector accepting a DVI display cable, HDMI, etc.).
[0065] User input devices 611 often are a type of peripheral device 612 (see below) and may include: card readers, dongles, finger print readers, gloves, graphics tablets, joysticks, keyboards, microphones, mice, remote controls, retina readers, touch screens (e.g., capacitive, resistive, etc.), trackballs, trackpads, sensors (e.g., accelerometers, ambient light, GPS, gyroscopes, proximity, etc.), styluses, and/or the like.
[0066] Peripheral devices 612 may be connected and/or communicate to I/Os and/or other facilities of the like such as network interfaces, storage interfaces, directly to the interface bus, system bus, the CPU, and/or the like. Peripheral devices may be external, internal and/or part of the DSFM controller. Peripheral devices may include: antennae, audio devices (e.g., line- in, line-out, microphone input, speakers, etc.), cameras (e.g., still, video, webcam, etc.), dongles (e.g., for copy protection, ensuring secure transactions with a digital signature, and/or the like), external processors (for added capabilities; e.g., crypto devices 628), force-feedback devices (e.g., vibrating motors), near field communication (NFC) devices, network interfaces, printers, radio frequency identifiers (RFIDs), scanners, storage devices, transceivers (e.g., cellular, GPS, etc.), video devices (e.g., goggles, monitors, etc.), video sources, visors, and/or the like.
Peripheral devices often include types of input devices (e.g., microphones, cameras, etc.).
[0067] It should be noted that although user input devices and peripheral devices may be employed, the DSFM controller may be embodied as an embedded, dedicated, and/or monitor- less (i.e., headless) device, wherein access would be provided over a network interface connection. [0068] Cryptographic units such as, but not limited to, microcontrollers, processors 626, interfaces 627, and/or devices 628 may be attached, and/or communicate with the DSFM controller. A MC68HC16 microcontroller, manufactured by Motorola Inc., may be used for and/or within cryptographic units. The MC68HC16 microcontroller utilizes a 16-bit multiply- and-accumulate instruction in the 16 MHz configuration and requires less than one second to perform a 512-bit RSA private key operation. Cryptographic units support the authentication of communications from interacting agents, as well as allowing for anonymous transactions.
Cryptographic units may also be configured as part of the CPU. Equivalent microcontrollers and/or processors may also be used. Other commercially available specialized cryptographic processors include: the Broadcom's CryptoNetX and other Security Processors; nCipher's nShield (e.g., Solo, Connect, etc.), SafeNet's Luna PCI (e.g., 7100) series; Semaphore
Communications' 40 MHz Roadrunner 184; sMIP's (e.g., 208956); Sun's Cryptographic Accelerators (e.g., Accelerator 6000 PCIe Board, Accelerator 500 Daughtercard); / (e.g., L2100, L2200, U2400) line, which is capable of performing 500+ MB/s of cryptographic instructions; VLSI Technology's 33 MHz 6868; and/or the like.
[0069] Generally, any mechanization and/or embodiment allowing a processor to affect the storage and/or retrieval of information is regarded as memory 629. However, memory is a fungible technology and resource, thus, any number of memory embodiments may be employed in lieu of or in concert with one another. It is to be understood that the DSFM controller and/or a computer systemization may employ various forms of memory 629. For example, a computer systemization may be configured wherein the operation of on-chip CPU memory (e.g., registers), RAM, ROM, and any other storage devices are provided by a paper punch tape or paper punch card mechanism; however, such an embodiment would result in an extremely slow rate of operation. In one configuration, memory 629 will include ROM 606, RAM 605, and a storage device 614. A storage device 614 may employ any number of computer storage devices/sy stems. Storage devices may include a drum; a (fixed and/or removable) magnetic disk drive; a magneto- optical drive; an optical drive (i.e., Blueray, CD ROM/RAM/Recordable (R)/Re Writable (RW), DVD R/RW, HD DVD R/RW etc.); an array of devices (e.g., Redundant Array of Independent Disks (RAID)); solid state memory devices (USB memory, solid state drives (SSD), etc.); other processor-readable storage mediums; and/or other devices of the like. Thus, a computer systemization generally requires and makes use of memory.
[0070] The memory 629 may contain a collection of program and/or database
components and/or data such as, but not limited to: operating system component(s) 615
(operating system); information server component(s) 616 (information server); user interface component(s) 617 (user interface); Web browser component(s) 618 (Web browser); database(s) 619; mail server component(s) 621; mail client component(s) 622; cryptographic server component(s) 620 (cryptographic server); the DSFM component(s) 635; and/or the like (i.e., collectively a component collection). These components may be stored and accessed from the storage devices and/or from storage devices accessible through an interface bus. Although non- conventional program components such as those in the component collection, may be stored in a local storage device 614, they may also be loaded and/or stored in memory such as: peripheral devices, RAM, remote storage facilities through a communications network, ROM, various forms of memory, and/or the like.
[0071 ] The operating system component 615 is an executable program component facilitating the operation of the DSFM controller. The operating system may facilitate access of I/Os, network interfaces, peripheral devices, storage devices, and/or the like. The operating system may be a highly fault tolerant, scalable, and secure system such as: Apple Macintosh OS X (Server); AT&T Plan 9; Be OS; Unix and Unix-like system distributions (such as AT&T's UNIX; Berkley Software Distribution (BSD) variations such as FreeBSD, NetBSD, OpenBSD, and/or the like; Linux distributions such as Red Hat, Ubuntu, and/or the like); and/or the like operating systems. However, more limited and/or less secure operating systems also may be employed such as Apple Macintosh OS, IBM OS/2, Microsoft DOS, Microsoft Windows 2000/2003/3.1/95/98/CE/Millenium/NT/Vista/XP (Server), Palm OS, and/or the like. In addition, mobile operating systems such as Apple's iOS, Google's Android, Hewlett Packard's WebOS, Microsoft Windows Mobile, and/or the like may be employed. Any of these operating systems may be embedded within the hardware of the DSFM controller, and/or stored/loaded into memory/storage. An operating system may communicate to and/or with other components in a component collection, including itself, and/or the like. Most frequently, the operating system communicates with other program components, user interfaces, and/or the like. For example, the operating system may contain, communicate, generate, obtain, and/or provide program
component, system, user, and/or data communications, requests, and/or responses. The operating system, once executed by the CPU, may enable the interaction with communications networks, data, I/Os, peripheral devices, program components, memory, user input devices, and/or the like. The operating system may provide communications protocols that allow the DSFM controller to communicate with other entities through a communications network 613. Various
communication protocols may be used by the DSFM controller as a subcarrier transport mechanism for interaction, such as, but not limited to: multicast, TCP/IP, UDP, unicast, and/or the like. [0072] An information server component 616 is a stored program component that is executed by a CPU. The information server may be an Internet information server such as, but not limited to, Apache Software Foundation's Apache, Microsoft's Internet Information Server, and/or the like. The information server may allow for the execution of program components through facilities such as Active Server Page (ASP), ActiveX, (ANSI) (Objective-) C (++), C# and/or .NET, Common Gateway Interface (CGI) scripts, dynamic (D) hypertext markup language (HTML), FLASH, Java, JavaScript, Practical Extraction Report Language (PERL), Hypertext Pre-Processor (PHP), pipes, Python, wireless application protocol (WAP),
WebObjects, and/or the like. The information server may support secure communications protocols such as, but not limited to, File Transfer Protocol (FTP); HyperText Transfer Protocol (HTTP); Secure Hypertext Transfer Protocol (HTTPS), Secure Socket Layer (SSL), messaging protocols (e.g., America Online (AOL) Instant Messenger (AIM), Apple's iMessage, Application Exchange (APEX), ICQ, Internet Relay Chat (IRC), Microsoft Network (MSN) Messenger Service, Presence and Instant Messaging Protocol (PRIM), Internet Engineering Task Force's (IETF's) Session Initiation Protocol (SIP), SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE), open XML-based Extensible Messaging and Presence Protocol (XMPP) (i.e., Jabber or Open Mobile Alliance's (OMA's) Instant Messaging and Presence Service (IMPS)), Yahoo! Instant Messenger Service, and/or the like. The information server provides results in the form of Web pages to Web browsers, and allows for the manipulated generation of the Web pages through interaction with other program components. After a Domain Name System (DNS) resolution portion of an HTTP request is resolved to a particular information server, the information server resolves requests for information at specified locations on the DSFM controller based on the remainder of the HTTP request. For example, a request such as http://123.124.125.126/myInformation.html might have the IP portion of the request "123.124.125.126" resolved by a DNS server to an information server at that IP address; that information server might in turn further parse the http request for the "/mylnformation.html" portion of the request and resolve it to a location in memory containing the information
"mylnformation.html." Additionally, other information serving protocols may be employed across various ports, e.g., FTP communications across port 21, and/or the like. An information server may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the information server communicates with the DSFM database 619, operating systems, other program components, user interfaces, Web browsers, and/or the like.
[0073 ] Access to the DSFM database may be achieved through a number of database bridge mechanisms such as through scripting languages as enumerated below (e.g., CGI) and through inter-application communication channels as enumerated below (e.g., CORBA, WebObjects, etc.). Any data requests through a Web browser are parsed through the bridge mechanism into appropriate grammars as required by the DSFM. In one embodiment, the information server would provide a Web form accessible by a Web browser. Entries made into supplied fields in the Web form are tagged as having been entered into the particular fields, and parsed as such. The entered terms are then passed along with the field tags, which act to instruct the parser to generate queries directed to appropriate tables and/or fields. In one embodiment, the parser may generate queries in standard SQL by instantiating a search string with the proper join/select commands based on the tagged text entries, wherein the resulting command is provided over the bridge mechanism to the DSFM as a query. Upon generating query results from the query, the results are passed over the bridge mechanism, and may be parsed for formatting and generation of a new results Web page by the bridge mechanism. Such a new results Web page is then provided to the information server, which may supply it to the requesting Web browser.
[0074] Also, an information server may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
[0075] Computer interfaces in some respects are similar to automobile operation interfaces. Automobile operation interface elements such as steering wheels, gearshifts, and speedometers facilitate the access, operation, and display of automobile resources, and status. Computer interaction interface elements such as check boxes, cursors, menus, scrollers, and windows (collectively and commonly referred to as widgets) similarly facilitate the access, capabilities, operation, and display of data and computer hardware and operating system resources, and status. Operation interfaces are commonly called user interfaces. Graphical user interfaces (GUIs) such as the Apple Macintosh Operating System's Aqua and iOS's Cocoa Touch, IBM's OS/2, Google's Android Mobile UI, Microsoft's Windows
2000/2003/3. l/95/98/CE/Millenium/Mobile/NT/XPA^ista/7/8 (i.e., Aero, Metro), Unix's X- Windows (e.g., which may include additional Unix graphic interface libraries and layers such as K Desktop Environment (KDE), mytfiTV and GNU Network Object Model Environment (GNOME)), web interface libraries (e.g., ActiveX, AJAX, (D)HTML, FLASH, Java, JavaScript, etc. interface libraries such as, but not limited to, Dojo, jQuery(UI), MooTools, Prototype, script, aculo .us, SWFObject, Yahoo! User Interface, any of which may be used and) provide a baseline and means of accessing and displaying information graphically to users. [0076] A user interface component 617 is a stored program component that is executed by a CPU. The user interface may be a graphic user interface as provided by, with, and/or atop operating systems and/or operating environments such as already discussed. The user interface may allow for the display, execution, interaction, manipulation, and/or operation of program components and/or system facilities through textual and/or graphical facilities. The user interface provides a facility through which users may affect, interact, and/or operate a computer system. A user interface may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the user interface communicates with operating systems, other program components, and/or the like. The user interface may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
[0077] A Web browser component 618 is a stored program component that is executed by a CPU. The Web browser may be a hypertext viewing application such as Google's (Mobile) Chrome, Microsoft Internet Explorer, Netscape Navigator, Apple's (Mobile) Safari, embedded web browser objects such as through Apple's Cocoa (Touch) object class, and/or the like. Secure Web browsing may be supplied with 128bit (or greater) encryption by way of HTTPS, SSL, and/or the like. Web browsers allowing for the execution of program components through facilities such as ActiveX, AJAX, (D)HTML, FLASH, Java, JavaScript, web browser plug-in APIs (e.g., Chrome, FireFox, Internet Explorer, Safari Plug-in, and/or the like APIs), and/or the like. Web browsers and like information access tools may be integrated into PDAs, cellular telephones, smartphones, and/or other mobile devices. A Web browser may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the Web browser communicates with information servers, operating systems, integrated program components (e.g., plug-ins), and/or the like; e.g., it may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses. Also, in place of a Web browser and information server, a combined application may be developed to perform similar operations of both. The combined application would similarly effect the obtaining and the provision of information to users, user agents, and/or the like from the DSFM equipped nodes. The combined application may be nugatory on systems employing standard Web browsers.
[0078] A mail server component 621 is a stored program component that is executed by a
CPU 603. The mail server may be an Internet mail server such as, but not limited to Apple's Mail Server (3), dovecot, sendmail, Microsoft Exchange, and/or the like. The mail server may allow for the execution of program components through facilities such as ASP, ActiveX, (ANSI) (Objective-) C (++), C# and/or .NET, CGI scripts, Java, JavaScript, PERL, PHP, pipes, Python, WebObjects, and/or the like. The mail server may support communications protocols such as, but not limited to: Internet message access protocol (IMAP), Messaging Application Programming Interface (MAPI)/Microsoft Exchange, post office protocol (POP3), simple mail transfer protocol (SMTP), and/or the like. The mail server can route, forward, and process incoming and outgoing mail messages that have been sent, relayed and/or are otherwise traversing through and/or to the DSFM system.
[0079] Access to the DSFM system mail may be achieved through a number of APIs offered by the individual Web server components and/or the operating system.
[0080] Also, a mail server may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, information, and/or responses. [0081 ] A mail client component 622 is a stored program component that is executed by a
CPU 603. The mail client may be a mail viewing application such as Apple (Mobile) Mail, Microsoft Entourage, Microsoft Outlook, Microsoft Outlook Express, Mozilla, Thunderbird, and/or the like. Mail clients may support a number of transfer protocols, such as: IMAP, Microsoft Exchange, POP3, SMTP, and/or the like. A mail client may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the mail client communicates with mail servers, operating systems, other mail clients, and/or the like; e.g., it may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, information, and/or responses. Generally, the mail client provides a facility to compose and transmit electronic mail messages.
[0082] A cryptographic server component 620 is a stored program component that is executed by a CPU 603, cryptographic processor 626, cryptographic processor interface 627, cryptographic processor device 628, and/or the like. Cryptographic processor interfaces will allow for expedition of encryption and/or decryption requests by the cryptographic component; however, the cryptographic component, alternatively, may run on a CPU. The cryptographic component allows for the encryption and/or decryption of provided data. The cryptographic component allows for both symmetric and asymmetric (e.g., Pretty Good Protection (PGP)) encryption and/or decryption. The cryptographic component may employ cryptographic techniques such as, but not limited to: digital certificates (e.g., X.509 authentication framework), digital signatures, dual signatures, enveloping, password access protection, public key management, and/or the like. The cryptographic component will facilitate numerous (encryption and/or decryption) security protocols such as, but not limited to: checksum, Data Encryption Standard (DES), Elliptical Curve Encryption (ECC), International Data Encryption Algorithm (IDEA), Message Digest 5 (MD5, which is a one way hash operation), passwords, Rivest Cipher (RC5), Rijndael, RSA (which is an Internet encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman), Secure Hash Algorithm (SHA), Secure Socket Layer (SSL), Secure Hypertext Transfer Protocol (HTTPS), and/or the like. Employing such encryption security protocols, the DSFM system may encrypt all incoming and/or outgoing communications and may serve as node within a virtual private network (VPN) with a wider communications network. The cryptographic component facilitates the process of "security authorization" whereby access to a resource is inhibited by a security protocol wherein the cryptographic component effects authorized access to the secured resource. In addition, the cryptographic component may provide unique identifiers of content, e.g., employing and MD5 hash to obtain a unique signature for an digital audio file. A cryptographic component may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. The cryptographic component supports encryption schemes allowing for the secure transmission of information across a communications network to enable one or more DSFM components to engage in secure transactions if so desired. The cryptographic component facilitates the secure accessing of resources on the DSFM system and facilitates the access of secured resources on remote systems; i.e., it may act as a client and/or server of secured resources. Most frequently, the cryptographic component communicates with information servers, operating systems, other program components, and/or the like. The cryptographic component may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses. [0083 ] The DSFM database component 619 may be embodied in a database and its stored data. The database is a stored program component, which is executed by the CPU; the stored program component portion configuring the CPU to process the stored data. The database may be any of a number of fault tolerant, relational, scalable, secure database such as DB2, MySQL, Oracle, Sybase, and/or the like. Relational databases are an extension of a flat file. Relational databases consist of a series of related tables. The tables are interconnected via a key field. Use of the key field allows the combination of the tables by indexing against the key field; i.e., the key fields act as dimensional pivot points for combining information from various tables. Relationships generally identify links maintained between tables by matching primary keys. Primary keys represent fields that uniquely identify the rows of a table in a relational database. More precisely, they uniquely identify rows of a table on the "one" side of a "one-to-many" relationship.
[0084] Alternatively, the DSFM database may be implemented using various standard data-structures, such as an array, hash, (linked) list, struct, structured text file (e.g., XML), table, and/or the like. Such data-structures may be stored in memory and/or in (structured) files. In another alternative, an object-oriented database may be used, such as Frontier, ObjectStore, Poet, Zope, and/or the like. Object databases can include a number of object collections that are grouped and/or linked together by common attributes; they may be related to other object collections by some common attributes. Object-oriented databases perform similarly to relational databases with the exception that objects are not just pieces of data but may have other types of capabilities encapsulated within a given object. If the DSFM database is implemented as a data- structure, the use of the DSFM database 619 may be integrated into another component such as the DSFM component 635. Also, the database may be implemented as a mix of data structures, objects, and relational structures. Databases may be consolidated and/or distributed in countless variations through standard data processing techniques. Portions of databases, e.g., tables, may be exported and/or imported and thus decentralized and/or integrated.
[0085] In one embodiment, the database component 619 includes several tables 619a-f.
A Users table 619a may include fields such as, but not limited to: user id, ssn, dob, first name, last_name, age, state, address_firstline, address_secondline, zipcode, devices_list, contact_info, contact type, alt contact info, alt contact type, and/or the like. The Users table may support and/or track multiple entity accounts on a DSFM system. A Clients table 619b may include fields such as, but not limited to: device lD, device name, device lP, deviceJVIAC, devicejype, device_model, device_version, device_OS, device_apps_list, device_securekey, and/or the like. An Apps table 619c may include fields such as, but not limited to:
application ID, application name, application type, application backup list, application sync, and/or the like. A Messages table 619d may include fields such as, but not limited to: msg id, msg_application, timestamp, msg_details_list, message_size, message_origin,
message synchronization, and/or the like. A Failover table 619e may include fields such as, but not limited to: failover lD, failover timestamp, primary application, secondary application, failover check time, and/or the like. A Code Paths table 619f may include fields such as, but not limited to: codepath ID, codepath itrtions, optmz thrshld min, optmz thrshld max, codepath length, codepath_priorty, and/or the like.
[0086] In one embodiment, the DSFM database may interact with other database systems. For example, employing a distributed database system, queries and data access by search DSFM component may treat the combination of the DSFM database, an integrated data security layer database as a single database entity. [0087] In one embodiment, user programs may contain various user interface primitives, which may serve to update the DSFM system. Also, various accounts may require custom database tables depending upon the environments and the types of clients the DSFM system may need to serve. It should be noted that any unique fields may be designated/labelled as a key field throughout. In an alternative embodiment, these tables have been decentralized into their own databases and their respective database controllers (i.e., individual database controllers for each of the above tables). Employing standard data processing techniques, one may further distribute the databases over several computer systemizations and/or storage devices. Similarly, configurations of the decentralized database controllers may be varied by consolidating and/or distributing the various database components 619a-f. The DSFM system may be configured to keep track of various settings, inputs, and parameters via database controllers.
[0088] The DSFM database may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the DSFM database communicates with one or more DSFM components, other program components, and/or the like. The database may contain, retain, and provide information regarding other nodes and data.
[0089] The DSFM component 635 is a stored program component that is executed by a
CPU. In one embodiment, the DSFM component incorporates any and/or all combinations of the aspects of the various embodiments of a DSFM system discussed in the previous figures. As such, embodiments of the DSFM system can affect accessing, obtaining and the provision of information, services, transactions, and/or the like across various communications networks.
[0090] The one or more DSFM components may remedy a failed execution at a primary instance of a software application into an execution of secondary instance of the software application that is in sync with the execution of the primary instance prior to failure thereof. In one embodiment, the DSFM component 635 takes inputs (e.g., fragmented virtual addresses 204; and/or the like) etc., and transforms the inputs via various components (e.g., IMAS 641; and/or the like), into outputs (e.g., continous and infinite virtual memory address space 206; and/or the like).
[0091 ] The DSFM component(s) enabling access of information between nodes may be developed by employing standard development tools and languages such as, but not limited to: Apache components, Assembly, ActiveX, binary executables, (ANSI) (Objective-) C (++), C# and/or .NET, database adapters, CGI scripts, Java, JavaScript, mapping tools, procedural and object oriented development tools, PERL, PHP, Python, shell scripts, SQL commands, web application server extensions, web development environments and libraries (e.g., Microsoft's ActiveX; Adobe AIR, FLEX & FLASH; AJAX; (D)HTML; Dojo, Java; JavaScript; jQuery(UI); MooTools; Prototype; script.aculo.us; Simple Object Access Protocol (SOAP); SWFObject; Yahoo! User Interface; and/or the like), WebObjects, and/or the like. In one embodiment, a DSFM server employs a cryptographic server to encrypt and decrypt communications. The DSFM component(s) may communicate to and/or with other components in a component collection, including itself, and/or facilities of the like. Most frequently, the DSFM component(s) communicates with the DSFM database, operating systems, other program components, and/or the like. Embodiments of the DSFM system may contain, communicate, generate, obtain, and/or provide program component, system, user, and/or data communications, requests, and/or responses.
[0092] The structure and/or operation of any of the DSFM node controller components may be combined, consolidated, and/or distributed in any number of ways to facilitate development and/or deployment. Similarly, the component collection may be combined in any number of ways to facilitate deployment and/or development. To accomplish this, one may integrate the components into a common code base or in a facility that can dynamically load the components on demand in an integrated fashion.
[0093 ] The component collection may be consolidated and/or distributed in countless variations through standard data processing and/or development techniques. Multiple instances of any one of the program components in the program component collection may be instantiated on a single node, and/or across numerous nodes to improve performance through load-balancing and/or data-processing techniques. Furthermore, single instances may also be distributed across multiple controllers and/or storage devices; e.g., databases. All program component instances and controllers working in concert may do so through standard data processing communication techniques.
[0094] The configuration of the embodiments of a DSFM controller may depend on the context of system deployment. Factors such as, but not limited to, the budget, capacity, location, and/or use of the underlying hardware resources may affect deployment requirements and configuration. Regardless of whether the configuration results in more consolidated and/or integrated program components, results in a more distributed series of program components, and/or results in some combination between a consolidated and distributed configuration, data may be communicated, obtained, and/or provided. Instances of components consolidated into a common code base from the program component collection may communicate, obtain, and/or provide data. This may be accomplished through intra-application data processing
communication techniques such as, but not limited to: data referencing (e.g., pointers), internal messaging, object instance variable communication, shared memory space, variable passing, and/or the like.
[0095] If component collection components are discrete, separate, and/or external to one another, then communicating, obtaining, and/or providing data with and/or to other components may be accomplished through inter-application data processing communication techniques such as, but not limited to: Application Program Interfaces (API) information passage; (distributed) Component Object Model ((D)COM), (Distributed) Object Linking and Embedding ((D)OLE), and/or the like), Common Object Request Broker Architecture (CORBA), Jini local and remote application program interfaces, JavaScript Object Notation (JSON), Remote Method Invocation (RMI), SOAP, process pipes, shared files, and/or the like. Messages sent between discrete components for inter-application communication or within memory spaces of a singular component for intra-application communication may be facilitated through the creation and parsing of a grammar. A grammar may be developed by using development tools such as lex, yacc, XML, and/or the like, which allow for grammar generation and parsing capabilities, which in turn may form the basis of communication messages within and between components.
[0096] For example, a grammar may be arranged to recognize the tokens of an HTTP post command, e.g.:
w3c -post http://... Valuel
[0097] where Value 1 is discerned as being a parameter because "http ://" is part of the grammar syntax, and what follows is considered part of the post value. Similarly, with such a grammar, a variable "Valuel" may be inserted into an "http://" post command and then sent. The grammar syntax itself may be presented as structured data that is interpreted and/or otherwise used to generate the parsing mechanism (e.g., a syntax description text file as processed by lex, yacc, etc.). Also, once the parsing mechanism is generated and/or instantiated, it itself may process and/or parse structured data such as, but not limited to: character (e.g., tab) delineated text, HTML, structured text streams, XML, and/or the like structured data. In another
embodiment, inter-application data processing protocols themselves may have integrated and/or readily available parsers (e.g., JSON, SOAP, and/or like parsers) that may be employed to parse data (e.g., communications). Further, the parsing grammar may be used beyond message parsing, but may also be used to parse: databases, data collections, data stores, structured data, and/or the like. Again, the desired configuration will depend upon the context, environment, and
requirements of system deployment.
[0098] For example, in some implementations, the DSFM controller may be executing a
PHP script implementing a Secure Sockets Layer ("SSL") socket server via the information server, which listens to incoming communications on a server port to which a client may send data, e.g., data encoded in JSON format. Upon identifying an incoming communication, the PHP script may read the incoming message from the client device, parse the received JSON- encoded text data to extract information from the JSON-encoded text data into PHP script variables, and store the data (e.g., client identifying information, etc.) and/or extracted information in a relational database accessible using the Structured Query Language ("SQL"). An exemplary listing, written substantially in the form of PHP/SQL commands, to accept JSON- encoded input data from a client device via a SSL connection, parse the data to extract variables, and store the data to a database, is provided below:
<?PHP
header ( ' Content-Type : text/plain ' ) ;
// set ip address and port to listen to for incoming data
$address = 1192.168.0.100 ' ; $port = 255;
// create a server-side SSL socket, listen for/accept incoming communication $sock = socket_create (AF_INET, SOCK_STREAM, 0);
socket_bind ($sock, $address, $port) or die ( 'Could not bind to address');
socket_listen ($sock) ;
$client = socket_accept ($sock) ;
// read input data from client device in 1024 byte blocks until end of message do {
$ input = "";
$input = socket_read ( $client, 1024);
$data .= $input;
} while ($ input != "") ;
/ / parse data to extract variables
$obj = j son_decode ( $data, true) ;
/ / store input data in a database
mysql_connect ( "201.408.185.132 " , $DBserver , $password) ; // access database server mysql_select ( "CLIENT_DB . SQL" ) ; // select database to append
mysql_query ("INSERT INTO UserTable (transmission)
VALUES ($data)"); // add data to UserTable table in a CLIENT database mysql_close ( "CLIENT_DB. SQL" ) ; // close connection to database
?>
[0099] Also, the following resources may be used to provide example embodiments regarding SOAP parser implementation: http : / /www . xav . com/perl/ site/ lib/ SOAP/Parser . html
http : / /publib . boulder . ibm . com/ infocenter/tivihelp/v2rl/ index. j sp?topic=/com . ibm . IBMDI . doc/ referenceguide295. htm and other parser implementations: http : / /publib . boulder . ibm . com/ infocenter/tivihelp/v2rl/ index. j sp?topic=/com . ibm . IBMDI . doc/ referenceguide259. htm all of which are hereby expressly incorporated by reference herein. [00100] It is to be understood that, depending on the particular needs and/or characteristics of a DSFM individual and/or enterprise user, database configuration and/or relational model, data type, data transmission and/or network framework, syntax structure, and/or the like, various embodiments of the DSFM system may be implemented that allow a great deal of flexibility and customization. While various embodiments of a DSFM system and discussion thereof has been directed to application execution optimization and efficacy, it is to be understood that the embodiments described herein may be readily configured and/or customized for a wide variety of other applications and/or implementations.
[00101 ] While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any inventions or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
[00102] Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
[00103 ] Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In certain implementations, multitasking and parallel processing may be advantageous.
[00104] What is claimed is :

Claims

Claims
1. A method for executing an application expeditiously on at least one computer processor, the method comprising:
simultaneously executing a plurality of instances of the application on the at least one computer processor, each instance being compiled according to a respective compiler option that is different from respective compiler options used to compile all other instances from the plurality of instances; and
for each one of a first plurality of results to be produced by the application:
monitoring, corresponding to the result, a respective output generated by each instance; and
labelling from the monitored outputs the output occurring earliest as output of the application corresponding to the result, and labelling all other outputs as duplicates, thereby speeding up a computing performance of the at least one computer processor.
2. The method of claim 1, wherein:
the plurality of instances comprises a first instance and a second instance;
the compiler option for the first instance comprises ahead-of-time (AIT) compilation; and the compiler option for the second instance comprises just-in-time (JIT) compilation, wherein JIT compilation is based on, at least in part, runtime information obtained from at least one prior execution of the second instance.
3. The method of claim 1, wherein:
the plurality of instances comprises a first instance; and
the compiler option for the first instance is selected from a group consisting of unconstrained memory usage, minimization of memory usage, maximization of concurrent operations, and constrained concurrency of operations.
4. The method of claim 1, further comprising:
labelling one instance from the plurality of instances as a primary instance;
labelling all other instances as secondary instances; and
for each result from a second plurality of results to be produced by the application, suppressing, corresponding to the result, respective outputs from the secondary instances.
5. The method of claim 4, further comprising:
identifying a failure of the primary instance after producing k results from the second plurality of results, k > 1;
labelling the primary instance as a failed instance;
selecting a secondary instance that executed logic associated with computation of each of the k results; and
re-labelling the selected secondary instances as the primary instance, whereby the relabelled primary instance produces (k+l)-th result.
6. The method of claim 1, wherein at least a portion of source code of the software application is specified using a programming language that is at least partially interpreted.
7. A method for enabling failover for a software application, the method comprising:
monitoring by a processor-based controller simultaneous executions of: (i) a primary instance of the software application, the primary instance being compiled according to a first compiler option, and (ii) a first secondary instance of the application, the first secondary instance being compiled according to a compiler option that is different from the first compiler option; detecting a failure of the primary instance after production of k results of the software application, k > 1 ; confirming that the first secondary instance has computed operations required to compute the k-th result; and
labelling the first secondary instance as the primary instance.
8. The method of claim 7, wherein the controller suppresses outputs of the first secondary instance that correspond to the k results.
9. The method of claim 7, wherein the first compiler option comprises just-in-time (JIT) compilation, and the compiler option used for the first secondary instance comprises ahead-of- time (AIT) compilation.
10. The method of claim 7, further comprising:
monitoring by the controller simultaneous execution of: (iii) a second secondary instance of the application, the second secondary instance being compiled according to a compiler option that is different from both the first compiler option and the compiler option used to compile the first secondary instance;
if the first secondary instance is not confirmed to have computed the operations required to compute the k-th result:
confirming that the second secondary instance has the computed operations required to compute the k-th result; and
labelling the second secondary instance as the primary instance.
11. A system for executing an application expeditiously on at least one computer processor, comprising:
a first processor; and
a first memory in electrical communication with the first processor, the first memory comprising instructions which, when executed by a processing unit comprising at least one of the first processor and a second processor, program the processing unit to:
simultaneously execute a plurality of instances of the application on the at least one computer processor, each instance being compiled according to a respective compiler option that is different from respective compiler options used to compile all other instances from the plurality of instances; and
for each one of a first plurality of results to be produced by the application:
monitor, corresponding to the result, a respective output generated by each instance; and
label from the monitored outputs the output occurring earliest as output of the application corresponding to the result, and label all other outputs as duplicates, thereby speeding up a computing performance of the at least one computer processor.
12. The system of claim 11, wherein:
the plurality of instances comprises a first instance and a second instance;
the compiler option for the first instance comprises ahead-of-time (AIT) compilation; and the compiler option for the second instance comprises just-in-time (JIT) compilation, wherein JIT compilation is based on, at least in part, runtime information obtained from at least one prior execution of the second instance.
13. The system of claim 11 , wherein:
the plurality of instances comprises a first instance; and
the compiler option for the first instance is selected from a group consisting of unconstrained memory usage, minimization of memory usage, maximization of concurrent operations, and constrained concurrency of operations.
14. The system of claim 11 , wherein the instructions further program the processing unit to: label one instance from the plurality of instances as a primary instance;
label all other instances as secondary instances; and
for each result from a second plurality of results to be produced by the application, suppress, corresponding to the result, respective outputs from the secondary instances.
15. The system of claim 14, wherein the instructions further program the processing unit to: identify a failure of the primary instance after producing k results from the second plurality of results, k > 1;
label the primary instance as a failed instance;
select a secondary instance that executed logic associated with computation of each of the k results; and
re-label the selected secondary instances as the primary instance, whereby the re-labelled primary instance produces (k+l)-th result.
16. The system of claim 11, wherein at least a portion of source code of the software application is specified using a programming language that is at least partially interpreted.
17. A system for failover for a software application, comprising:
a first processor; and
a first memory in electrical communication with the first processor, the first memory comprising instructions which, when executed by a processing unit comprising at least one of the first processor and a second processor, program the processing unit to:
monitor simultaneous executions of: (i) a primary instance of the software application, the primary instance being compiled according to a first compiler option, and (ii) a first secondary instance of the application, the first secondary instance being compiled according to a compiler option that is different from the first compiler option; detect a failure of the primary instance after production of k results of the software application, k > 1 ;
confirm that the first secondary instance has computed operations required to compute the k-th result; and
label the first secondary instance as the primary instance.
18. The system of claim 17, wherein the instructions further program the processing unit to suppress outputs of the first secondary instance that correspond to the k results.
19. The system of claim 17, wherein the first compiler option comprises just-in-time (JIT) compilation, and the compiler option used for the first secondary instance comprises ahead-of- time (AIT) compilation.
20. The system of claim 17, wherein the instructions further program the processing unit to: monitor simultaneous execution of: (iii) a second secondary instance of the application, the second secondary instance being compiled according to a compiler option that is different from both the first compiler option and the compiler option used to compile the first secondary instance;
if the first secondary instance is not confirmed to have computed the operations required to compute the k-th result:
confirm that the second secondary instance has the computed operations required to compute the k-th result; and
label the second secondary instance as the primary instance.
PCT/US2015/019920 2014-03-11 2015-03-11 Systems and methods for data synchronization and failover management WO2015138586A1 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
ES15761173T ES2776366T3 (en) 2014-03-11 2015-03-11 Systems and Methods for Data Synchronization and Failover Management
AU2015229434A AU2015229434B2 (en) 2014-03-11 2015-03-11 Systems and methods for data synchronization and failover management
EP15761173.2A EP3117308B1 (en) 2014-03-11 2015-03-11 Systems and methods for data synchronization and failover management
CA2942359A CA2942359C (en) 2014-03-11 2015-03-11 Systems and methods for data synchronization and failover management
KR1020207034291A KR102250617B1 (en) 2014-03-11 2015-03-11 Systems and methods for data synchronization and failover management
BR112016021037-9A BR112016021037B1 (en) 2014-03-11 2015-03-11 METHOD AND SYSTEM FOR RUNNING AN APPLICATION IN EXPEDITION MODE ON AT LEAST ONE COMPUTATIONAL PROCESSOR, METHOD AND SYSTEM FOR ALLOWING FAULT TOLERANCE FOR A SOFTWARE APPLICATION
KR1020167027986A KR102250613B1 (en) 2014-03-11 2015-03-11 Systems and methods for data synchronization and failover management
SG11201607515XA SG11201607515XA (en) 2014-03-11 2015-03-11 Systems and methods for data synchronization and failover management
JP2016556727A JP6592450B2 (en) 2014-03-11 2015-03-11 System and method for data synchronization and failover management

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201461951374P 2014-03-11 2014-03-11
US61/951,374 2014-03-11
US14/644,674 2015-03-11
US14/644,674 US10210005B2 (en) 2014-03-11 2015-03-11 Systems and methods for data synchronization and failover management

Publications (1)

Publication Number Publication Date
WO2015138586A1 true WO2015138586A1 (en) 2015-09-17

Family

ID=54072362

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/019920 WO2015138586A1 (en) 2014-03-11 2015-03-11 Systems and methods for data synchronization and failover management

Country Status (9)

Country Link
EP (1) EP3117308B1 (en)
JP (1) JP6592450B2 (en)
KR (2) KR102250617B1 (en)
AU (1) AU2015229434B2 (en)
BR (1) BR112016021037B1 (en)
CA (1) CA2942359C (en)
ES (1) ES2776366T3 (en)
SG (2) SG10201802998YA (en)
WO (1) WO2015138586A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019109019A1 (en) * 2017-11-30 2019-06-06 Hewlett Packard Enterprise Development Lp Reducing recovery time of an application
CN110663006A (en) * 2017-03-24 2020-01-07 西门子股份公司 Resilient failover for industrial programmable logic controllers

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6233725B1 (en) * 1998-12-03 2001-05-15 International Business Machines Corporation Method and apparatus to coordinate and control the simultaneous use of multiple just in time compilers with a java virtual machine
US20040073904A1 (en) * 2002-10-15 2004-04-15 Nokia Corporation Method and apparatus for accelerating program execution in platform-independent virtual machines
US20110214016A1 (en) * 2010-03-01 2011-09-01 International Business Machines Corporation Performing Aggressive Code Optimization with an Ability to Rollback Changes Made by the Aggressive Optimizations
US20130139137A1 (en) * 2011-11-29 2013-05-30 Futurewei Technologies, Inc. Systems and Methods for Customizing Optimization/Transformation/ Processing Strategies

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60150159A (en) * 1984-01-17 1985-08-07 Agency Of Ind Science & Technol Multiplexed processing system
JPH04153764A (en) * 1990-10-18 1992-05-27 Nec Corp System for increasing processing speed of decentralized cpu
JP3008521B2 (en) * 1991-02-26 2000-02-14 日本電気株式会社 Call function execution control method
JP2921190B2 (en) * 1991-07-25 1999-07-19 日本電気株式会社 Parallel execution method
JPH06131312A (en) * 1992-01-23 1994-05-13 Hitachi Ltd Method and system for parallel processing
JP3605327B2 (en) * 1999-11-18 2004-12-22 富士通株式会社 Program execution device
JP4783005B2 (en) * 2004-11-25 2011-09-28 パナソニック株式会社 Program conversion apparatus, program conversion execution apparatus, program conversion method, and program conversion execution method
US8621275B1 (en) * 2010-08-06 2013-12-31 Open Invention Network, Llc System and method for event-driven live migration of multi-process applications
JP2007334643A (en) 2006-06-15 2007-12-27 Renesas Technology Corp Program execution method, program, and program execution system
US8627300B2 (en) * 2009-10-13 2014-01-07 Empire Technology Development Llc Parallel dynamic optimization

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6233725B1 (en) * 1998-12-03 2001-05-15 International Business Machines Corporation Method and apparatus to coordinate and control the simultaneous use of multiple just in time compilers with a java virtual machine
US20040073904A1 (en) * 2002-10-15 2004-04-15 Nokia Corporation Method and apparatus for accelerating program execution in platform-independent virtual machines
US20110214016A1 (en) * 2010-03-01 2011-09-01 International Business Machines Corporation Performing Aggressive Code Optimization with an Ability to Rollback Changes Made by the Aggressive Optimizations
US20130139137A1 (en) * 2011-11-29 2013-05-30 Futurewei Technologies, Inc. Systems and Methods for Customizing Optimization/Transformation/ Processing Strategies

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110663006A (en) * 2017-03-24 2020-01-07 西门子股份公司 Resilient failover for industrial programmable logic controllers
CN110663006B (en) * 2017-03-24 2023-04-04 西门子股份公司 Method for performing failover of programmable logic controller and controlling physical system
WO2019109019A1 (en) * 2017-11-30 2019-06-06 Hewlett Packard Enterprise Development Lp Reducing recovery time of an application
CN110291505A (en) * 2017-11-30 2019-09-27 慧与发展有限责任合伙企业 Reduce the recovery time of application
US11663094B2 (en) 2017-11-30 2023-05-30 Hewlett Packard Enterprise Development Lp Reducing recovery time of an application

Also Published As

Publication number Publication date
CA2942359C (en) 2020-10-06
AU2015229434B2 (en) 2020-02-06
KR102250613B1 (en) 2021-05-10
KR102250617B1 (en) 2021-05-10
KR20160132434A (en) 2016-11-18
AU2015229434A1 (en) 2016-09-29
JP6592450B2 (en) 2019-10-16
EP3117308B1 (en) 2020-02-19
BR112016021037B1 (en) 2023-10-17
EP3117308A1 (en) 2017-01-18
ES2776366T3 (en) 2020-07-30
EP3117308A4 (en) 2018-01-17
CA2942359A1 (en) 2015-09-17
KR20200137045A (en) 2020-12-08
SG11201607515XA (en) 2016-10-28
JP2017511939A (en) 2017-04-27
SG10201802998YA (en) 2018-05-30
BR112016021037A2 (en) 2017-08-15

Similar Documents

Publication Publication Date Title
US10210005B2 (en) Systems and methods for data synchronization and failover management
US10528942B2 (en) Augmented smart tag security apparatuses, methods and systems
US20140197234A1 (en) Snap Mobile Security Apparatuses, Methods and Systems
US10909005B2 (en) Object-level metadata-preserving cross heterogeneous operating systems backup and restore apparatuses, methods and systems
US10915407B2 (en) Source volume backup with adaptive finalization apparatuses, methods and systems
US11455541B2 (en) AI-based neighbor discovery search engine apparatuses, methods and systems
US11080139B2 (en) Systems and methods for data synchronization and failover management
US10866808B2 (en) Methods and systems to track kernel calls using a disassembler
US11841768B2 (en) Multi-client backup deduplication apparatuses, methods and systems
JP2021192214A (en) Method and device for verifying operation states of applications
US9547565B2 (en) Techniques for message retransmission mechanism
US11238757B2 (en) Shifting substitution cipher based efficient vaultless data tokenization apparatuses, methods and systems
EP3117308B1 (en) Systems and methods for data synchronization and failover management
WO2011041176A1 (en) Apparatuses, methods and systems for a social networking application updater
US11003545B2 (en) User space incremental tracking apparatuses, methods and systems
US20160048544A1 (en) System and method for hierarchical categorization of collaborative tagging
AU2015229429B2 (en) Techniques for message retransmission mechanism
US20210125277A1 (en) AI-Based Real-Time Prediction Engine Apparatuses, Methods and Systems
CN113760765A (en) Code testing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15761173

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2015761173

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015761173

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2016556727

Country of ref document: JP

Kind code of ref document: A

Ref document number: 2942359

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2015229434

Country of ref document: AU

Date of ref document: 20150311

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20167027986

Country of ref document: KR

Kind code of ref document: A

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112016021037

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112016021037

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20160912