Southampton, England, United Kingdom
4K followers 500+ connections

Join to view profile

Activity

Join now to see all activity

Experience & Education

  • IBM

View Chris’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’sUser Agreement,Privacy Policy, andCookie Policy.

Licenses & Certifications

Publications

  • The Support Authority: Deploying IBM Support Assistant 5 Beta into an IBM cloud environment

    IBM developerWorks

    The IBM® Support Assistant (ISA) is a free application that provides features for problem determination and a platform for obtaining diagnostic tools. The most recent release of ISA, version 5.0, which is currently in beta, brings these capabilities into a server environment enabling team-based collaboration on analysis and the deployment of server-level system resources to carry out analysis. This article covers some of the advantages of deploying ISA 5 into a server environment, and how to do…

    The IBM® Support Assistant (ISA) is a free application that provides features for problem determination and a platform for obtaining diagnostic tools. The most recent release of ISA, version 5.0, which is currently in beta, brings these capabilities into a server environment enabling team-based collaboration on analysis and the deployment of server-level system resources to carry out analysis. This article covers some of the advantages of deploying ISA 5 into a server environment, and how to do this with the various IBM cloud offerings environment using the IBM Application Pattern for Java™. This content is part of the IBM WebSphere Developer Technical Journal.

    See publication
  • From Java code to Java heap: Understanding and optimizing your application's memory usage

    IBM developerWorks

    This article gives you insight into the memory usage of Java™ code, covering the memory overhead of putting an int value into an Integer object, the cost of object delegation, and the memory efficiency of the different collection types. You'll learn how to determine where inefficiencies occur in your application and how to choose the right collections to improve your code.

    See publication
  • Garbage collection in WebSphere Application Server V8, Part 1: Generational as the new default policy

    IBM developerWorks

    Not all workloads are created equal. Different applications use memory in different ways and thus can benefit from different garbage collection strategies. The IBM® Java™ Virtual Machine (JVM) has always supported several different GC policies to support various types of applications. At the same time, hardware is evolving and software must adapt to make better use of it. In IBM WebSphere® Application Server V8 the default garbage collection policy uses both generational and concurrent…

    Not all workloads are created equal. Different applications use memory in different ways and thus can benefit from different garbage collection strategies. The IBM® Java™ Virtual Machine (JVM) has always supported several different GC policies to support various types of applications. At the same time, hardware is evolving and software must adapt to make better use of it. In IBM WebSphere® Application Server V8 the default garbage collection policy uses both generational and concurrent collection strategies. This article provides a brief description of the garbage collection policies available in the IBM JVM, along with a guide for configuring the new default policy. This content is part of the IBM WebSphere Developer Technical Journal.

    Other authors
    • Karl Taylor
    • Charlie Gracie
    See publication
  • The Support Authority: Why the Memory Analyzer (with IBM Extensions) isn't just for memory leaks anymore

    IBM developerWorks

    The IBM® Monitoring and Diagnostics for Java™ - Memory Analyzer is a powerful tool for diagnosing memory leaks and footprint problems from the dump of a Java process such as IBM WebSphere® Application Server. It can also give you detailed insight into your Java code and enable you to debug some tricky problems from just one dump, without having to insert diagnostic code or restart the process. This article shows you how to use Memory Analyzer combined with the new IBM Extensions for Memory…

    The IBM® Monitoring and Diagnostics for Java™ - Memory Analyzer is a powerful tool for diagnosing memory leaks and footprint problems from the dump of a Java process such as IBM WebSphere® Application Server. It can also give you detailed insight into your Java code and enable you to debug some tricky problems from just one dump, without having to insert diagnostic code or restart the process. This article shows you how to use Memory Analyzer combined with the new IBM Extensions for Memory Analyzer plug-in to examine the states of both WebSphere Application Server and your application. This content is part of the IBM WebSphere Developer Technical Journal.

    See publication
  • Debugging from dumps: Diagnose more than memory leaks with Memory Analyzer

    IBM developerWorks

    Memory Analyzer is a powerful tool for diagnosing memory leaks and footprint problems from the dump of a Java™ process. It can also give you detailed insight into your Java code and enable you to debug some tricky problems from just one dump, without needing to insert diagnostic code. In this article, you'll learn how to generate dumps and use them to examine the state of your application.

    Other authors
    • Andrew Johnson
    See publication
  • Java technology, IBM style: A new era in Java technology

    IBM developerWorks

    The eagerly awaited final release of Java™ SE 7 is expected to include enhancements to all the major aspects of the language and the virtual machine. Both Oracle and IBM have released Early Access downloads of their respective implementations for review and feedback. In this article, Chris Bailey, architect of the Java service strategy at the IBM Java Technology Center, introduces some of the changes in store, from both the Oracle specification and the value-add that IBM provides.

    See publication
  • Guided Debugging for IBM Java

    IBM Online

    Step-by-step quidance on the methods and techniques used to identify and responding to memory, performance, hang and crash problems when running IBMs Runtimes for Java.

    See publication
  • Java technology, IBM Style: Monitoring and problem determination

    IBM developerWorks

    The IBM implementation of Java™ technology, Version 5.0 contains a number of useful tools that help you diagnose and solve Java development problems. In this final installment in our Java technology, IBM style series, you learn about the information available from the IBM trace and dump engines. You also get an introduction to the Diagnostic Toolkit and Framework for Java (DTFJ) API, with which you can write code that queries and analyzes diagnostic data.

    Other authors
    • Simon Rowland
    See publication
  • Java technology, IBM style: Introduction to the IBM Developer Kit

    IBM developerWorks

    With the advent of Java™ 5.0 comes advances from IBM® in its Java technology implementations. This article opens a six-part series on changes in the latest version of the IBM Developer Kit. Author Chris Bailey begins with a brief description of the improvements to the Java 5.0 platform and moves on to a whistle-stop tour of the changes in SDKs from IBM.

    See publication
  • IBM Java Diagnostics Guide

    IBM Online

    A guide to understanding, using, and diagnosing the IBM Java Runtimes.

    Other authors
    • Java Technology Center IBM® development and service departments in Hursley, Bangalore, Toronto and Ottawa
    See publication
Join now to see all publications

Patents

  • Request Tracing

    IssuedUS11785115B2

    Embodiments of the present invention provide concepts for tracing a request in a distributed system architecture comprising one or more distributed services. A request is received at a network traffic component on one of a plurality of sockets, which are monitored by a span correlation component. Span data is obtained from the received request and a process identification component is adapted to identify a process associated with the request based on the span data. The span correlation…

    Embodiments of the present invention provide concepts for tracing a request in a distributed system architecture comprising one or more distributed services. A request is received at a network traffic component on one of a plurality of sockets, which are monitored by a span correlation component. Span data is obtained from the received request and a process identification component is adapted to identify a process associated with the request based on the span data. The span correlation component is adapted to identify a socket connection made by the identified process and correlate the socket connection with the span data, thereby generating span correlation data.

    See patent
  • Predicting microservices required for incoming requests

    IssuedUS11683391B2

    A method, system, and computer program product for predicting microservices required for incoming requests for reducing the start latency of serverless microservices. The method may include obtaining tracing data of microservices of an application for historical requests processed by the application. The method may also include grouping the tracing data based on common request attributes. The method may also include aggregating each group into rules relating the common request attributes to…

    A method, system, and computer program product for predicting microservices required for incoming requests for reducing the start latency of serverless microservices. The method may include obtaining tracing data of microservices of an application for historical requests processed by the application. The method may also include grouping the tracing data based on common request attributes. The method may also include aggregating each group into rules relating the common request attributes to lists of microservices. The method may also include building a predictive model formed of the rules for processing incoming requests to obtain a list of predicted microservices required for the incoming request based on attributes of the incoming request.

    Other inventors
    • Ian Partridge
    See patent
  • Dynamically Switchable Transmission Data Formats in a Computer System

    IssuedUS US20200099764A1

    A method, apparatus, system, and computer program product for dynamically selecting transmission data formats for communicating data. A request for a server application sent from a client application is received by receiving, by a computer system. The request includes first data in a first transmission data format and identifies a set of transmission data formats acceptable to the client application. A determination is made by the computer system as whether the first transmission data format is…

    A method, apparatus, system, and computer program product for dynamically selecting transmission data formats for communicating data. A request for a server application sent from a client application is received by receiving, by a computer system. The request includes first data in a first transmission data format and identifies a set of transmission data formats acceptable to the client application. A determination is made by the computer system as whether the first transmission data format is supported. A response from the server application with second data in a selected transmission data format in the set of transmission data formats by the computer system in response to the first transmission data format being supported.

    Other inventors
    • Michael Tunnicliffe
    See patent
  • Automatically building a web api definition from a microservice or web application

    IssuedUS US20190354414A1

    Methods and systems may provide for technology to determine dynamic path information and encoded type information associated with an application programming interface (API) and automatically generate a language-independent API definition based on the dynamic path information. In one example, the language-independent API definition is generated without reliance on source code annotations.

    Other inventors
    • Michael Tunnicliffe
    See patent
  • Maintaining core dump privacy during application fault handling

    IssuedUS20200065181A1

    Maintaining core dump privacy during application fault handling. A core memory dump is received for an application from a runtime engine. Areas of the core memory dump are analyzed to identify structural data in the form of internal structures of the runtime engine. The identified structural data is retained in a modified core memory dump, and remaining non-structural data in the areas of the core memory dump is processed to ensure it is not readable by unauthorized entities in the modified…

    Maintaining core dump privacy during application fault handling. A core memory dump is received for an application from a runtime engine. Areas of the core memory dump are analyzed to identify structural data in the form of internal structures of the runtime engine. The identified structural data is retained in a modified core memory dump, and remaining non-structural data in the areas of the core memory dump is processed to ensure it is not readable by unauthorized entities in the modified core memory dump. The modified core memory dump is outputted for fault analysis.

    Other inventors
    • Paul Bullis
    See patent
  • Handling request data with type safety in a remote service

    IssuedUS US20200034272A1

    Method and system are provided for handling request data with type safety in a remote service. The method includes providing a data structure, the data structure comprising a set of entries, each entry matching an incoming request type with a function for handling the request, the function defining a set of parameters. The method includes receiving an incoming request for a service from a remote client, wherein the request includes request data. The method includes using the data structure and…

    Method and system are provided for handling request data with type safety in a remote service. The method includes providing a data structure, the data structure comprising a set of entries, each entry matching an incoming request type with a function for handling the request, the function defining a set of parameters. The method includes receiving an incoming request for a service from a remote client, wherein the request includes request data. The method includes using the data structure and identifying an entry for the incoming request by matching the request data to an incoming request type of an entry. The method includes converting the incoming request into a set of parameters using a software construct of the matching function identified in the entry, wherein the software construct comprises the matching function and associated in-scope local variables; and running the function using the converted parameters.

    Other inventors
    • Michael Tunnicliffe
    See patent
  • Direct transmission of data between applications in a multi-tenant environment

    IssuedUS US10341287B2

    Overhead of sending data from one application to another by doing input and output processing can be costly. The present invention provides a method of transmitting data with a low overhead between applications in a multi-tenant runtime environment. The multi-tenant runtime detects a connection between tenants, and then performs low-overhead data transmission mechanisms by cloning data from one tenant space to another tenant space, while keeping the data isolated for two tenants.

    See patent
  • Virtual machine load balancing

    IssuedUS US9547520B1

    The method includes estimating an amount of unused memory in a memory allocation of one or more virtual machines based on a data associated with one or more applications previously dispatched to the one or more virtual machines. The method includes receiving a request for executing a new application. The method includes estimating an amount of memory utilized by one of the one or more virtual machines to execute the new application. The method includes dispatching the new application to one of…

    The method includes estimating an amount of unused memory in a memory allocation of one or more virtual machines based on a data associated with one or more applications previously dispatched to the one or more virtual machines. The method includes receiving a request for executing a new application. The method includes estimating an amount of memory utilized by one of the one or more virtual machines to execute the new application. The method includes dispatching the new application to one of the one or more virtual machine having an amount of unused memory exceeding the estimated amount of memory required to execute the new application. The method includes updating the data associated with the one or more applications previously dispatched to the one or more virtual machines by adding an identifier of the new application to the data.

    Other inventors
    • Alexander Kelly
    • Edwin Moffatt
    • Ross Pavitt
    • Alexander Mirski-Fitton
    See patent
  • Managing thread execution in a multitasking computing environment

    FiledUS US10169078B2

    A thread in a computing system is processed for execution of instructions to perform an action. The action is one of the following: accessing a shared resource or executing a critical section of code. A schedule of the thread is managed. The management prevents suspension of the thread during execution of the action.

    Other inventors
    • Oli Deakin
    See patent
  • Creating a metatype tree for metatype introspection

    FiledUS20210097090A1

    Concepts for creating a metatype tree for metatype introspection are presented. One example comprises decoding a parent metatype from a synthetic dataset by decoding one or more child metatypes of the parent metatype. The method then comprises creating a metatype tree comprising a parent node and one or more child nodes of the parent node. The parent node comprises the decoded parent metatype and the one or more child nodes of the parent node comprise the one or more decoded child metatypes.

    Other inventors
    • Ian Partridge
    • Enrique Lacal
    • Neil Hardman
    See patent
  • Middleware in web framework

    FiledUS20200285530A1

    Concepts for middleware in a web framework are presented. One example comprises defining a target object type configured to hold results of a middleware function. A first object for an application is received and a process of the middleware function is performed, using the first object, to generate a process result. Based on the process result, a second object of the target object type is generated, after which the second object is provided to the application.

    Other inventors
    • Ian Partridge
    • Andrew Lees
    See patent
  • Detecting memory leaks in dynamic data collections

    FiledGB GB915513D0

Recommendations received

More activity by Chris

View Chris’ full profile

  • See who you know in common
  • Get introduced
  • Contact Chris directly
Join to view full profile

Other similar profiles

  • John Wylie

    John Wylie

    Professional Cloud Architect with more than 20 years’ experience designing integrated on premise & Cloud delivered solutions for large corporate customers ensuring business goals and expectations are surpassed and key relationships established<br>Key Achievements:<br>Designed a Public Cloud integration service using Kubernetes for an International energy utility company.<br>Designed an integration and data storage capability to maintain a legislated audit trail of data for a large European distribution company<br>Constructed a collaborative plan to implement better agile work practices and simultaneous expansion of integration capabilities between Integration team and Agile Development teams within a leading Industrial Components and Tools company<br>Designed the infrastructure as a service to support the hosting topology for a prominent Asset Management company

    1K followers
    Prestwood
  • James Wormwell

    James Wormwell

    GitLab

    1K followers
    Ramsbottom
  • Dale Lane

    Dale Lane

    IBM

    2K followers
    Greater Southampton Area
  • Robbie Jerrom

    Robbie Jerrom

    OpenUK

    2K followers
    Southampton
  • Rob Nicholson

    Rob Nicholson

    Philips

    2K followers
    Greater Portsmouth Area
  • Rhys Wilkins

    Rhys Wilkins

    Sainsbury's

    2K followers
    West Midlands
  • Lorand Marton

    Lorand Marton

    Orgvue

    862 followers
    London
  • Mark Hossack

    Mark Hossack

    Alithya

    715 followers
    Greater London
  • Nick Hill

    Nick Hill

    TXP

    2K followers
    Aldridge
  • Santu Maity

    Santu Maity

    Replaice Technologies

    7K followers
    Bengaluru
  • Norm Dunning

    Norm Dunning

    Oracle

    1K followers
    Camden Town
  • David Pearson

    David Pearson

    Red Hat

    1K followers
    Ashford
  • Jason Marston

    Jason Marston

    Lloyds Banking Group

    2K followers
    Lymm
  • David Samuelson

    David Samuelson

    M&G plc

    1K followers
    Bonnyrigg
  • Sencan Sengul

    Sencan Sengul

    Senior technical executive with demonstrated history of leading teams for business led transformations through first of a kind digital solutions, delivered on time, safely, and within budget.<br><br>30 years of diverse experience in IT and services industry with financial services expertise and strategic business development combined. CTO responsibilities include shaping and leading large, complex deals in Financial Services, helping clients achieve their transformative goals through technology, leading diverse teams, and developing technical talent.

    2K followers
    London
  • Paul Tatham

    Paul Tatham

    LSEG

    543 followers
    Greater Derby Area
  • Nitesh Thakrar

    Nitesh Thakrar

    Microsoft

    1K followers
    Stafford
  • Rob Davies

    Rob Davies

    2K followers
    Leighton Buzzard
  • Ian Moores

    Ian Moores

    nimbus

    2K followers
    Chippenham
  • Andrey Zhmaylik

    Andrey Zhmaylik

    Epic Games

    1K followers
    London

Explore more posts

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others namedChris Bailey inUnited Kingdom

609 others named Chris Bailey in United Kingdom are on LinkedIn

See others namedChris Bailey