Monitoring computer process resource usage
First Claim
1. A method, comprising:
- a first computer system establishing a secure network session with a second computer system;
the first computer system analyzing processes executing on the first computer system during the secure network session based on a set of criteria;
based on the analyzing, the first computer system identifying a first set of the processes that correspond to the secure network session and a second set of the processes that do not correspond to the secure network session;
responsive to the identifying, the first computer system prioritizing the first set of processes relative to the second set of processes, wherein the prioritizing includes;
the first computer system allocating additional computing resources to one or more of the first set of the processes, wherein the first set of the processes includes a process that communicates via the secure network session; and
the first computer system suspending one or more of the second set of the processes.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are disclosed relating to improving resource usage on a computer system. In one embodiment, a computer system identifies a plurality of processes running on the computer system and determines an importance value and a resource consumption value. In such an embodiment, the importance value is indicative of an importance of an identified process, and the resource consumption value is indicative of a resource consumption of the identified process. The computer system evaluates the importance value and the resource consumption value relative to a usage policy, and takes a corrective action with respect to the identified process based on the evaluating to reconcile resource consumption with process importance value.
-
Citations
13 Claims
-
1. A method, comprising:
-
a first computer system establishing a secure network session with a second computer system; the first computer system analyzing processes executing on the first computer system during the secure network session based on a set of criteria; based on the analyzing, the first computer system identifying a first set of the processes that correspond to the secure network session and a second set of the processes that do not correspond to the secure network session; responsive to the identifying, the first computer system prioritizing the first set of processes relative to the second set of processes, wherein the prioritizing includes; the first computer system allocating additional computing resources to one or more of the first set of the processes, wherein the first set of the processes includes a process that communicates via the secure network session; and the first computer system suspending one or more of the second set of the processes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory, computer-readable medium having program instructions stored thereon that are executable to cause a first computer system to perform operations comprising:
-
establishing a network session with a second computer system to communicate data; identifying processes executing on the first computer system as session processes and non-session processes based on one or more criteria, wherein the session processes are relevant to the established network session, and wherein the non-session processes are not relevant to the established network session, wherein the one or more criteria include whether a process produces network traffic for the network session; and in response to the identifying, prioritizing the sessions processes by allocating additional computing resources to one or more of the session processes, wherein the one or more session processes includes a process that produces network traffic for the network session. - View Dependent Claims (12, 13)
-
Specification