a

Process for manufacturing partially cross-linked alginate solution

Described is a microfluidic process for manufacturing partially cross-linked alginate solution, wherein the alginate solution is a homogenous liquid which exhibits an elastic response (G') which is equal to or greater than its viscous response (G″). In particular, the process may comprise microfluidic mixing of sodium alginate and calcium gluconate solutions to provide an injectable partially cross-linked alginate solution.




a

Biocatalysts for ezetimibe synthesis

The present disclosure relates to non-naturally occurring polypeptides useful for preparing Ezetimibe, polynucleotides encoding the polypeptides, and methods of using the polypeptides.




a

Metabolically engineered cells for the production of resveratrol or an oligomeric or glycosidically-bound derivative thereof

A recombinant micro-organism producing resveratrol by a pathway in which phenylalanine ammonia lyase (PAL) produces trans-cinnamic acid from phenylalanine, cinnamate 4-hydroxylase (C4H) produces 4-coumaric acid from said trans-cinnamic acid, 4-coumarate-CoA ligase (4CL) produces 4-coumaroyl CoA from said 4-coumaric acid, and resveratrol synthase (VST) produces said resveratrol from said 4-coumaroyl CoA, or in which L-phenylalanine- or tyrosine-ammonia lyase (PAL/TAL) produces 4-coumaric acid, 4-coumarate-CoA ligase (4CL) produces 4-coumaroyl CoA from said 4-coumaric acid, and resveratrol synthase (VST) produces said resveratrol from said 4-coumaroyl CoA. The micro-organism may be a yeast, fungus or bacterium including Saccharomyces cerevisiae, E. coli, Lactococcus lactis, Aspergillus niger, or Aspergillus oryzae.




a

Production of glucose from starch using alpha-amylases from Bacillus subtilis

An α-amylase from Bacillus subtilis (AmyE) produces significant amounts of glucose from various carbohydrate substrates, including vegetable starch, maltoheptaose, and maltotriose. Among other things, this advantageous property allows AmyE or variants thereof to be used in a saccharification reaction having a reduced or eliminated requirement for glucoamylase. The reduction or elimination of the glucoamylase requirement significantly improves the efficiency of the production of ethanol or high fructose corn syrup, for example.




a

Cytosine analogue, a method of preparation of a cytosine analogue, a DNA methyltransferase 1 inhibitor, a method for DNA methylation inhibition, the use of the analogue in the treatment of diseases associated with deviations from normal DNA methylation

A cytosine analog, a method of preparation of a cytosine analog, a DNA methyltransferase 1 inhibitor, and a method for DNA methylation inhibition, is provided for the treatment of diseases associated with deviations from normal DNA methylation. The analog of cytosine may be comprised of 1, N4, 5 and 6-substituted derivatives of cytosine or 5,6-dihydrocytosine, wherein the analog can be described by the chemical formula where R1 is H, R3, R4, 2'-deoxyribosyl, R4 is alkyl or aryl, X is N or C, wherein if X in the analog of formula I is N, then R5 is no substituent and if X in the analog of formula I and/or II is C or if X in the analog of formula II is N, then R5 and R6 are independently alkyl, aryl, hydroxyalkyl, aminoalkyl, hydroxyl, carboxyl, amino group, alkoxyl, aryloxyl, aminoalkyl, aminoaryl, thio group, sulfonyl, sulfinyl or halogen.




a

RNA antagonists targeting GLI2 for the treatment of leukemia

The present invention relates to oligomer compounds (oligomers) for the treatment and prevention of acute myeloid leukemia, which target GLI2 mRNA in a cell, leading to reduced expression of GLI2.




a

RNAi-mediated inhibition of frizzled related protein-1 for treatment of glaucoma

RNA interference is provided for inhibition of Frizzled Related Protein-1 mRNA expression, in particular, for treating patients having glaucoma or at risk of developing glaucoma.




a

Reduction of ALMS1 gene expression or inhibition of altröm protein to induce cardiomyocyte proliferation

The present invention relates to the field of cardiology. More specifically, the present invention provides methods and compositions for inducing proliferation of cardiomyocytes. In a specific embodiment, a method for inducing proliferation of cardiomyocytes comprises the step of administering an effective amount of an ALMS1 inhibitor.




a

1,2,3-Triazolyl purine derivatives

The present invention relates to novel 1,2,3-triazolyl purine derivatives. The invention also relates to using the derivatives to treat cancer and various viral infections. An example of a 1,2,3-triazolyl purine derivative of the invention is




a

Compositions and methods for treating cancer

Provided herein are compounds used to inhibit the deamination enzyme responsible for the inactivation of therapeutic compounds, and methods of using them.




a

Synthesis and identification of novel RSK-specific inhibitors

A composition comprising an SL0101 [kaempferol 3-O-(3″,4″-di-O-acetyl-α-L-rhamnopyranoside)] derivative compound that has enhanced ability to inhibit RSK activity, relative to the parent compound is provided. The compounds have utility for treating any disease or conditions characterized or associated with excess or undesirable RSK activity. For example the RSK inhibitors of the present invention can be used to reduce the proliferation of neoplastic cells or for inhibiting the establishment or maintenance of an intracellular pathogenic infection by pathogens whose pathogenicity derives in part from the pathogen's ability to impede endosomal/phagosomal maturation in the host cell.




a

Reagents useful for synthesizing rhodamine-labeled oligonucleotides

The present disclosure provides reagents that can be used to label synthetic oligonucleotides with rhodamine dyes or dye networks that contain rhodamine dyes.




a

Formulations for nucleic acid stabilization on solid substrates

The present disclosure generally relates to dry solid matrices for the extraction, stabilization, and storage of nucleic acids, particularly RNA, in a dry format under ambient conditions for a prolonged period of time. Methods for collecting and recovering the nucleic acids stored in the dry solid matrix are also described.




a

Functionalization and purification of molecules by reversible group exchange

Embodiments of the present disclosure include methods and compositions for functionalizing molecules, such as oligonucleotides, with functional groups, including polyhistidine tags useful in affinity methods. Some embodiments include methods for modifying and purifying complex mixtures of molecules by exchange of functional tags.




a

Methods and compositions for extraction and storage of nucleic acids

A solid matrix for the extraction, stabilization, and storage of nucleic acids is provided. At least one protein denaturant, and at least one acid or acid-titrated buffer reagent are impregnated in a dry state therein the matrix; and the matrix is configured to provide an acidic pH on hydration. The matrix is configured to extract nucleic acids from a sample and stabilize the extracted nucleic acids, particularly RNA, in a dry format under ambient conditions for a prolonged period of time. Methods for collecting and recovering the nucleic acids stored in the dry solid matrix are also described.




a

Cellulose ethers having reactive anchor group, modified cellulose ethers obtainable therefrom and methods for the preparation thereof

Non-ionic water-soluble cellulose ethers modified with 3-azido-2-hydroxypropyl groups bound via an ether link are provided having a molar degree of substitution MSAHP in the range from 0.001 to 0.50. Exemplary cellulose ethers are alkyl celluloses, including methyl, hydroxyalkyl (e.g. hydroxyethyl or hydroxypropyl) or alkylhydroxyalkyl cellulose (e.g. methylhydroxyethyl). Reaction products with alkyne compounds are also provided, resulting in a terminal alkyne group. The reaction of azide with the alkyne proceeds as a 1,3-dipolar cycloaddition reaction, advantageously with Cu(I) or ruthenium catalysts. A multiplicity of cellulose ethers can be obtained from the conversion reaction. Variations in the macroscopic properties can be achieved by controlled modification, ranging from increased or reduced viscosity. The reaction, taking place within a few seconds, requires only minimal catalyst. Gel formation is reversible by adjustment of the pH such that a monophasic system (high-viscous fluid) arises again from a biphasic system (gel+low-viscous water phase).




a

Method for producing cationized cellulose and method for producing cationized hydroxyalkyl cellulose

A production method of a cationized cellulose or a cationized hydroxyalkylcellulose, including step 1 for adding a cationizing agent to cellulose and mechanically decrystallizing the cellulose and step 2 for adding a basic compound to the mixture obtained in step 1 and mechanically decrystallizing the cellulose, or a production method of a cationized cellulose or a cationized hydroxyalkylcellulose, including a step 3 for adding a basic compound to cellulose and mechanically decrystallizing the cellulose and step 4 for adding a cationizing agent to the mixture obtained in step 3 and mechanically decrystallizing the cellulose. The cellulose and the cationizing agent are allowed to react with each other in step 2 or step 4.




a

Flame retardant cellulose

Flame retardant cellulose is prepared comprising cellulose fibers and an organophosphate compound bonded to the cellulose fibers. Accordingly, the bonded phosphate-functional group provides the cellulose fibers with pendant phosphate ester functionality. Numerous phosphate derivatives can be envisaged that will accomplish the intended task.




a

Cellulose interpolymers and method of oxidation

This invention provides cellulose ester interpolymers, and methods of oxidizing cellulose interpolymers and cellulose ester interpolymers. The invention also provides routes to access carboxylated cellulose ester derivatives with high acid numbers wherein the carboxyl group is attached directly to the cellulose backbone by a carbon-carbon bond. Through functionalization of an intermediate aldehyde, the corresponding cationic or zwitterionic cellulose ester derivatives can also be accessed. The interpolymers of the present invention have a number of end-use applications, for example, as binder resins in various types of coating compositions and as drug delivery agents.




a

Cellulose interpolymers and method of oxidation

This invention provides cellulose ester interpolymers, and methods of oxidizing cellulose interpolymers and cellulose ester interpolymers. The invention also provides routes to access carboxylated cellulose ester derivatives with high acid numbers wherein the carboxyl group is attached directly to the cellulose backbone by a carbon-carbon bond. Through functionalization of an intermediate aldehyde, the corresponding cationic or zwitterionic cellulose ester derivatives can also be accessed. The interpolymers of the present invention have a number of end-use applications, for example, as binder resins in various types of coating compositions and as drug delivery agents.




a

Cellulose interpolymers and method of oxidation

This invention provides cellulose ester interpolymers, and methods of oxidizing cellulose interpolymers and cellulose ester interpolymers. The invention also provides routes to access carboxylated cellulose ester derivatives with high acid numbers wherein the carboxyl group is attached directly to the cellulose backbone by a carbon-carbon bond. Through functionalization of an intermediate aldehyde, the corresponding cationic or zwitterionic cellulose ester derivatives can also be accessed. The interpolymers of the present invention have a number of end-use applications, for example, as binder resins in various types of coating compositions and as drug delivery agents.




a

Coating agent comprising hydroxyalkyl cellulose

A coating agent containing a hydroxyalkyl cellulose in which a content of hydroxyalkoxy groups within the hydroxyalkyl cellulose is within a range of 40 to 50% by mass, preferably a coating agent containing a hydroxyalkyl cellulose in which the content of hydroxyalkoxy groups is within a range of 40 to 50% by mass and also a viscosity of 2% aqueous solution at 20° C. is within a range of 3.0 to 5.9 mPa·s; and a solid preparation coated with the coating agent.




a

Methods and compositions for extraction and storage of nucleic acids

The present disclosure generally relates to solid matrices for the extraction, stabilization, and storage of nucleic acids, particularly RNA, in a dry format under ambient conditions for a prolonged period of time. Methods for extracting, collecting, and recovering nucleic acids from the solid compositions are also described.




a

Electronic device provided with cryptographic circuit and method of establishing the same

The present invention provides for an electronic device having cryptographic computation means arranged to generate cryptographic data within the device for enhancing security of communications therewith, the device including an onboard power supplying means arranged to provide for the driving of the said cryptographic computational means, and so as to provide a device by way of a manufacturing phase and a post manufacturing phase arranged for distribution and/or marketing of the device, and wherein the step of generating the cryptographic data occurs during the post manufacturing phase.




a

Implementing security measures for authorized tokens used in mobile transactions

Security measures for tokens comprise storing security rules associated with a generated token in a memory. A processor, communicatively coupled to the memory, accesses the security rules associated with the generated token and determines whether to encrypt the generated token by applying at least a portion of the security rules to the generated token. The processor encrypts the generated token. An interface, communicatively coupled to the processor, communicates the encrypted token to a mobile device associated with a user.




a

Systems and methods for data security

A system comprises a basic-input-output-system (“BIOS”), a disk drive, and a security system configured to prevent unauthenticated access to the disk drive. For each of at least two users out of a plurality of users, the BIOS authenticates the user based on the user's token. The BIOS also accesses secured data based on the authentication, and provides the secured data to the security system without input from the user.




a

Multiple volume encryption of storage devices using self encrypting drive (SED)

A method for encrypting data on a disk drive using self encrypting drive is provided. The method includes encryption of data chunks of a computing device. The method further includes associating the encrypted data chunks with encryption key indexes of the computing device. Moreover, the method further includes receiving the encryption key indexes for given logical block addresses of the data chunks. The method further includes determining the encryption keys to be used to encrypt the data chunks based on the encryption key indexes of the data chunks to the disk drive.




a

Discarding sensitive data from persistent point-in-time image

A network storage server implements a method to discard sensitive data from a Persistent Point-In-Time Image (PPI). The server first efficiently identifies a dataset containing the sensitive data from a plurality of datasets managed by the PPI. Each of the plurality of datasets is read-only and encrypted with a first encryption key. The server then decrypts each of the plurality of datasets, except the dataset containing the sensitive data, with the first encryption key. The decrypted datasets are re-encrypted with a second encryption key, and copied to a storage structure. Afterward, the first encryption key is shredded.




a

Method and apparatus for a trust processor

In an embodiment, an apparatus includes a cryptographic processor within a wireless device. The cryptographic processor includes at least one cryptographic unit. The cryptographic processor also includes a nonvolatile memory to store one or more microcode instructions, wherein at least one of the one or more microcode instructions is related to a sensitive operation. The cryptographic processor also includes a controller to control execution of the one or more microcode instructions by the at least one cryptographic unit, wherein the controller is to preclude execution of the sensitive operation if the apparatus is within an untrusted state.




a

Efficient storage of encrypted data in a dispersed storage network

A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the method continues with the processing module generating a first encryption key based on the data, encoding the first encryption key into encoded data slices in accordance with an error coding dispersal storage function, and storing the encoded data slices in a dispersed storage network (DSN) memory. The method continues with the processing module encrypting the data using an encryption key of the substantially similar data in accordance with an encryption function to produce encrypted data, compressing the encrypted data in accordance with a compression function to produce compressed data, storing the compressed data when the substantially similar data is stored.




a

Device incorporating data communication function

A device incorporating a data communication function 15 having a power supply circuit 38 of a dispersed power supply system is provided with a terminal 51-2 for receiving power supply from another device 14 which initiates data communication and a drive circuit 53-2 for performing the data communication with the another device 14, wherein when the terminal 51-2 is supplied with power, the power supplied to the terminal 51-2 is supplied to the drive circuit 53-2 in an off state of the power supply circuit 38. It thereby reduces self-power-loss and ensures reliability of performance.




a

Drawing power over network cable

A source device to provide power through a network cable and a user device is to draw power from the network cable. A database is to store a parameter associated with the user device. The source device is to access the stored parameter based on receipt of information related to the user device and is to compare at least one of a current power drawn and an additional power requested by the user device to a power limit of the user device based on the accessed parameters. The source device is to send a power message to the user device based on the comparison, the power message to relate to an amount of the power the user device is to draw.




a

Method and apparatus for power management according to a situation mode

The disclosure discloses a power management method, for setting a power supply arrangement of an electronic device intelligently, comprising providing at least two sensors, corresponding to at least one threshold respectively; detecting a state of the electronic device for generating a detecting signal respectively; comparing the at least two detecting signals with the at least one threshold corresponding to the at least two sensors respectively; generating at least two situation signals when the at least two detecting signals meet the at least one threshold corresponding to the at least two sensors respectively; looking up a look-up table according to the at least two detecting signals for generating a control command; and writing in at least one independent bit of a register according to the control command for changing or maintaining a power supply arrangement of at least one peripheral component.




a

Resolution programmable dynamic IR-drop sensor with peak IR-drop tracking abilities

A data processing system on an integrated circuit includes a core that performs switching operations responsive to a system clock that draws current from the power supply network. An IR-drop detector includes a resistor ladder having outputs representative of an IR-drop caused by the core during the switching operations. The system further includes a plurality of amplifiers coupled to the outputs indicative of the IR-drop, a plurality of flip-flops coupled to the amplifiers, and a variable clock generator. The variable clock generator outputs a sampling clock comprising a group consisting of a variable phase or a variable frequency to the plurality of flip-flops. The flip-flops are triggered by the sampling clock so that the IR-drop at a time during a clock cycle of the system clock can be detected, and the peak IR-drop value for can be tracked.




a

Power-saving network management server, network system, and method of determining supply of power

A power-saving network management server, which is coupled to a network system including a network device and manages a state of power to the network device, wherein the power-saving network management server is configured to: store network configuration information and task allocation information; determine starting or stopping of the power supply to the port of the network device based on the updated network configuration information and task allocation information; store a determination result of the starting or stopping of the power supply to the port as a port determination result; and control the power supply to the port of the network device based on the port determination result.




a

Energy management device and power management system

An energy management system has an application storage, an application executing unit, a plurality of network interfaces, a policy setting unit configured to set whether each application should be permitted to access each of the network interfaces, a policy storage configured to store identification information for each application set by the policy setting unit, and access permit/inhibit information showing whether the application is permitted to access each of the network interfaces, an I/F management unit managing a correspondence relationship between a network address and each of the network interfaces, and to specify a network interface used by the application executed by the application executing unit, and an access controller configured to judge whether the application executed by the application executing unit is permitted to access the network interface to be used thereby, based on the access permit/inhibit information stored in the policy storage.




a

Host initiated state control of remote client in communications system

A system and method for low-cost, fault tolerant, EMI robust data communications, particularly for an EV environment. A data communications method, including a) enabling a transmission of a wake signal from a host to a remote client through an isolator disposed at the remote client when the wake signal is asserted from the host at a host-portion of the isolator concurrent with a periodic enablement of a client-portion of the isolator by the remote client; and thereafter b) transmitting the wake signal from the host to the remote client through the isolator; c) controlling enablement of the client-portion responsive to the wake signal transmitted through the isolator; and thereafter d) disabling the transmission by deassertion of the wake signal at the host.




a

Method and apparatus for power-efficiency management in a virtualized cluster system

A method and apparatus for power-efficiency management in a virtualized cluster system. The virtualized cluster system includes a front-end physical host and at least one back-end physical host, and each of the at least one back-end physical host comprises at least one virtual machine and a virtual machine manager. Flow characteristics of the virtualized cluster system are detected at a regular time cycle, then a power-efficiency management policy is generated for each of the at least one back-end physical host based on the detected flow characteristics, and finally the power-efficiency management policies are performed. The method can detect the real-time flow characteristics of the virtualized cluster system and make the power-efficiency management policies thereupon to control the power consumption of the system and perform admission control on the whole flow, thereby realizing optimal power saving while meeting the quality of service requirements.




a

Processor bridge power management

A power controller can set the power state of a processor bridge based on which processor modules are in a communicative state. In addition, for a power state where selected processor modules are expected to be non-communicative, the power controller can set the supplied voltage to have a reduced voltage guard band as compared to other power states. These power management techniques can reduce the power consumed by the processor.




a

Power shifting in multicore platforms by varying SMT levels

Power consumption in a microprocessor platform is managed by setting a peak power level for power consumed by a multi-core microprocessor platform executing multi-threaded applications. The multi-core microprocessor platform contains a plurality of physical cores, and each physical core is configurable into a plurality of logical cores. A simultaneous multithreading level in at least one physical core is adjusted by changing the number of logical cores on that physical core in response to a power consumption level of the multi-core microprocessor platform exceeding the peak power level. Performance and power data based on simultaneous multi-threading levels are used in selecting the physical core to be adjusted.




a

Methods and apparatuses for controlling the temperature of a data processing system

Methods and apparatuses to manage working states of a data processing system. At least one embodiment of the present invention includes a data processing system with one or more sensors (e.g., physical sensors such as tachometer and thermistors, and logical sensors such as CPU load) for fine grain control of one or more components (e.g., processor, fan, hard drive, optical drive) of the system for working conditions that balance various goals (e.g., user preferences, performance, power consumption, thermal constraints, acoustic noise). In one example, the clock frequency and core voltage for a processor are actively managed to balance performance and power consumption (heat generation) without a significant latency. In one example, the speed of a cooling fan is actively managed to balance cooling effort and noise (and/or power consumption).




a

Power management of multiple compute units sharing a cache

We report methods, integrated circuit devices, and fabrication processes relating to power management transitions of multiple compute units sharing a cache. One method includes indicating that a first compute unit of a plurality of compute units of an integrated circuit device is attempting to enter a low power state, determining if the first compute unit is the only compute unit of the plurality in a normal power state, and in response to determining the first compute unit is the only compute unit in the normal power state: saving a state of a shared cache unit of the integrated circuit device, flushing at least a portion of a cache of the shared cache unit, repeating the flushing until either a second compute unit exits the low power state or the cache is completely flushed, and permitting the first compute unit to enter the low power state.




a

Multi-cluster processing system and method of operating the same

A multi-cluster processing system and a method of operating a multi-cluster processing system are provided. The multi-cluster processing system includes: a first cluster including a plurality of first-type cores: a second cluster including a plurality of second-type cores; and a control unit configured to monitor loads of the first-type cores and the second-type cores, wherein when utilization of at least one of enabled first-type cores exceeds a predetermined threshold utilization of each of the first-type cores, the control unit enables at least one of disabled first-type cores in a first mode, and the control unit enables at least one of the disabled second-type cores and disables the first cluster in a second mode, wherein an amount of computation per unit of time of each of the second-type cores is greater than an amount of computation per unit of time of each of the first-type cores.




a

Image forming apparatus, system-on-chip (SoC) unit, and driving method thereof

An image forming apparatus is connected to a host device including first and second power domains which are separately supplied with power and includes first and second memories to be disposed in the second power domain, a main controller disposed in the first power domain and to perform a control operation using the first memory in a normal mode, and a sub-controller disposed in the second power domain and perform a control operation using the second memory in a power-saving mode, where when the normal mode is changed to the power-saving mode a power supply to the first power domain is shut off, the first memory operates in a self-refresh mode, and the main controller copies central processing unit (CPU) context information into a context storage unit, and when the power-saving mode is changed to the normal mode, the main controller is booted using the CPU context information stored in the context storage unit.




a

Power supply control system, method, and computer program product

According to an embodiment, a control system includes a detector, an estimating unit, a determining unit, and a controller. The detector detects an idle state. The estimating unit estimates an idle period. When the idle state is detected, the determining unit determines whether a first power consumption when writeback of data which needs to be written back to a main storage device is performed and supply of power to a cache memory is stopped, is larger than a second power consumption when writeback of the data is not performed and supply of power is continued for the idle period. The controller stops the supply of power to the cache memory when the first power consumption is determined to be smaller than the second power consumption and continues the supply of power when the first power consumption is determined to be larger than the second power consumption.




a

Security enclave processor power control

An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory.




a

Memory controller with transaction-queue-monitoring power mode circuitry

An integrated-circuit memory controller outputs to a memory device a first signal in a first state to enable operation of synchronous data transmission and reception circuits within the memory device. A transaction queue within the memory controller stores memory read and write requests that, to be serviced, require operation of the synchronous data transmission and reception circuits, respectively, within the memory device. Power control circuitry within the memory controller determines that the transaction queue has reached a predetermined state and, in response, outputs the first signal to the memory device in a second state to disable operation of the synchronous data transmission and reception circuits within the memory device.




a

Methods, systems, apparatuses, and computer-readable media for waking a SLIMbus without toggle signal

Arrangements for restarting data transmission on a serial low-power inter-chip media bus (SLIMbus) are presented. A clock signal may be provided in an active mode to a component communicatively coupled with the SLIMbus. Immediately prior to the clock signal in the active mode being provided, the clock signal may have been in a paused mode. While the clock signal was in the paused mode at least until the clock signal is provided in the active mode, the data line may have been inactive (e.g., a toggle on the data line may not have been present). Frame synchronization data for a frame may be transmitted. The frame synchronization data for the frame, as received by the component, may not match expected frame synchronization data. Payload data may be transmitted as part of the frame to the component, wherein the payload data is expected to be read properly by the component.




a

Identification and management of unsafe optimizations

Techniques for implementing identification and management of unsafe optimizations are disclosed. A method of the disclosure includes receiving, by a managed runtime environment (MRE) executed by a processing device, a notice of misprediction of optimized code, the misprediction occurring during a runtime of the optimized code, determining, by the MRE, whether a local misprediction counter (LMC) associated with a code region of the optimized code causing the misprediction exceeds a local misprediction threshold (LMT) value, and when the LMC exceeds the LMT value, compiling, by the MRE, native code of the optimized code to generate a new version of the optimized code, wherein the code region in the new version of the optimized code is not optimized.




a

Experiment manager for manycore systems

An execution environment may have a monitoring, analysis, and feedback loop that may configure and tune the execution environment for currently executing workloads. A monitoring or instrumentation system may collect operational and performance data from hardware and software components within the system. A modeling system may create an operational model of the execution environment, then may determine different sets of parameters for the execution environment. A feedback loop may change various operational characteristics of the execution environment. The monitoring, analysis, and feedback loop may optimize the performance of a computer system for various metrics, including throughput, performance, energy conservation, or other metrics based on the applications that are currently executing. The performance model of the execution environment may be persisted and applied to new applications to optimize the performance of applications that have not been executed on the system.