Patent application number | Description | Published |
20080209027 | SYSTEM AND METHOD FOR RECORDING BEHAVIOR HISTORY FOR ABNORMALITY DETECTION - Disclosed is an autonomic abnormality detection device having a plurality of agents, a server with a one or more processors, a data storage device and a corrective actions engine. The device is adapted to detect and diagnose abnormalities in system components. Particularly, the device uses agents to track performance/workload measurements of system components and dynamically compiles a history of those performance/workload measurements for each component. In order to detect abnormalities a processor compares current performance/workload measurements for a component to the compiled histories for that component and for other components. The processor can further be adapted to determine possible causes of a detected abnormality and to report the abnormality, including the possible causes, to a corrective actions engine. | 08-28-2008 |
20080222075 | AUTONOMIC RETENTION CLASSES - The embodiments of the invention provide methods, computer program products, etc. for autonomic retention classes when retaining data within storage devices. More specifically, a method of determining whether to retain data within at least one storage device begins by storing data items in at least one storage device. Furthermore, the method maintains access statistics for each of the data items, an age of each of the data items, and an administrator-defined importance value of each of the data items. Following this, a retention value is calculated for each of the data items based on the access statistics for each of the data items, the age of each of the data items, and the administrator-defined importance value of each of the data items. | 09-11-2008 |
20080222218 | RISK-MODULATED PROACTIVE DATA MIGRATION FOR MAXIMIZING UTILITY IN STORAGE SYSTEMS - The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted. | 09-11-2008 |
20080222225 | AUTONOMIC RETENTION CLASSES - The embodiments of the invention provide methods, computer program products, etc. for autonomic retention classes when retaining data within storage devices. More specifically, a method of determining whether to retain data within at least one storage device begins by storing data items in at least one storage device. Furthermore, the method maintains access statistics for each of the data items, an age of each of the data items, and an administrator-defined importance value of each of the data items. Following this, a retention value is calculated for each of the data items based on the access statistics for each of the data items, the age of each of the data items, and the administrator-defined importance value of each of the data items. | 09-11-2008 |
20080222644 | RISK-MODULATED PROACTIVE DATA MIGRATION FOR MAXIMIZING UTILITY IN STORAGE SYSTEMS - The embodiments of the invention provide a method, computer program product, etc. for risk-modulated proactive data migration for maximizing utility. More specifically, a method of planning data migration for maximizing utility of a storage infrastructure that is running and actively serving at least one application includes selecting a plurality of potential data items for migration and selecting a plurality of potential migration destinations to which the potential data items can be moved. Moreover, the method selects a plurality of potential migration speeds at which the potential data items can be moved and selects a plurality of potential migration times at which the potential data items can be moved to the potential data migration destinations. The selecting of the plurality of potential migration speeds selects a migration speed below a threshold speed, wherein the threshold speed defines a maximum system utility loss permitted. | 09-11-2008 |
20080262890 | SYSTEM AND METHOD FOR SELECTING AND SCHEDULING CORRECTIVE ACTIONS FOR AUTOMATED STORAGE MANAGEMENT - Disclosed is a storage management framework that integrates corrective action plans output from multiple different types of planning tools, sorts the different corrective action plans based on utility and risk values and outputs a time-based schedule for implementing one or more of the corrective action plans to resolve identified current and anticipated workload service level objective (SLO) violations. | 10-23-2008 |
20100106538 | DETERMINING DISASTER RECOVERY SERVICE LEVEL AGREEMENTS FOR DATA COMPONENTS OF AN APPLICATION - Techniques for determining one or more disaster recovery (DR) service level agreements (SLAs) for each of one or more components of an application are provided. The techniques include identifying one or more components of an application, capturing one or more intra-application data dependencies between the one or more components, and mapping each of the one or more components to a DR profile to determine one or more DR SLAs for each of the one or more components of an application. | 04-29-2010 |
20100250501 | STORAGE MANAGEMENT THROUGH ADAPTIVE DEDUPLICATION - One embodiment retrieves a first portion of a plurality of stored objects from at least one storage device. The embodiment further performs a base type deduplication estimation process on the first portion of stored objects. The embodiment still further categorizes the first portion of the plurality of stored objects into deduplication sets based on a deduplication relationship of each object of the plurality of stored objects with each of the estimated first plurality of deduplication chunk portions. The embodiment further combines deduplication sets into broad classes based on deduplication characteristics of the objects in the deduplication sets. The embodiment still further classifies a second portion of the plurality of stored objects into broad classes using classifiers. The embodiment further selects an appropriate deduplication approach for each categorized class. | 09-30-2010 |
20110022562 | SYSTEM AND METHOD FOR SEMANTIC INFORMATION EXTRACTION FRAMEWORK FOR INTEGRATED SYSTEMS MANAGEMENT - The invention provides an enterprise administration system and method. The system includes a user interface module configured to enter administration terms or select a predetermined script of administration terms, a knowledge base configured to store system information, a meta information module configured to use the system information to store entity-objective indexes, and a workflow mapping module configured to map the administration terms to system information extraction tasks to extract relevant entities and objectives and apply a rule to the extracted entities and objectives for presenting the extracted entities and objectives in a ranked order. | 01-27-2011 |
20110022879 | AUTOMATED DISASTER RECOVERY PLANNING - A system and associated method for automated disaster recovery (DR) planning. A DR planning process receives disaster recovery requirements and a target environment configuration from a user to design DR plans for the target environment configuration that meets disaster recovery requirements. The DR planning process accesses a knowledgebase containing information on replication technologies, best practice recipes, and past deployment instances. The DR planning process creates the DR plans by analyzing the disaster recovery requirements into element risks, associating replication technologies to protect each element risks, combining associated replication technologies based on the best practice recipes, and selecting highly evaluated combination based on the past deployment instances. The DR planning process presents the DR plans as classified by replication strategy-architecture combination for each DR plans and marks how strongly each DR plans are recommended. | 01-27-2011 |
20110055621 | DATA REPLICATION BASED ON CAPACITY OPTIMIZATION - A system and associated method for replicating data based on capacity optimization. A local node receives the data associated with a key. The local node within a local domain communicates with nodes of remote domains in a system through a communication network. Each domain has its own distributed hash table that partitions key space and assigns a certain key range to an owner node within the domain. For new data, the local node queries owner nodes of domains in the system progressively from the local domain to remote domains for a duplicate of the new data. Depending on a result returned by owner nodes and factors for replication strategies, the local node determines a replication strategy and records the new data in the local node pursuant to the replication strategy. | 03-03-2011 |
20110061051 | Dynamic Recommendation Framework for Information Technology Management - A method, system, and article are provided for managing performance of a computer system. Both implicit and explicit recommendations for processing of tasks are provided. System performance is tracked and evaluated based upon the actions associated with the task. Future recommendations of the same or other tasks are provided based upon implicit feedback pertaining to system performance, and explicit feedback solicited from a system administrator. | 03-10-2011 |
20110078695 | CHARGEBACK REDUCTION PLANNING FOR INFORMATION TECHNOLOGY MANAGEMENT - Reducing cost chargeback in an information technology (IT) computing environment including multiple resources, is provided. One implementation involves a process wherein resource usage and allocation statistics are stored for a multitude of resources and associated cost policies. Then, time-based usage patterns are determined for the resources from the statistics. A correlation of response time with resource usages and outstanding input/output instructions for the resources is determined. Based on usage patterns and the correlation, a multitude of potential cost reduction recommendations are determined. Further, a multitude of integrals are obtained based on the potential cost reduction recommendations, and a statistical integral is obtained based on the statistics. A difference between the statistical integral and each of the multiple integrals is obtained and compared with a threshold to determine potential final cost reduction recommendations. A final cost reduction recommendation is then selected from the potential cost reduction recommendations. | 03-31-2011 |
20110106938 | Multi-Level Offload of Model-Based Adaptive Monitoring for Systems Management - A method, system, and article are provided for monitoring performance of hardware devices. Each hardware device is configured with an agent, and the server is configured with a coordinator. The agent collects device data at a first modifiable frequency and communicates the collected data to the coordinator at a second dynamically modifiable frequency. The collected data is periodically monitored and the first and second frequencies are modified subject to evaluation of the collected and monitored data. | 05-05-2011 |
20110126219 | Middleware for Extracting Aggregation Statistics to Enable Light-Weight Management Planners - Management of a planner through use of a middleware layer. A computer system is configured with the middleware layer in communication with both a planner and a data repository. One or more modules are provided in the middleware layer to support the functionality of the planner. Application program interface calls are employed to call the modules, thereby mitigating duplication of the functionality in separate planners. | 05-26-2011 |
20110138391 | CONTINUOUS OPTIMIZATION OF ARCHIVE MANAGEMENT SCHEDULING BY USE OF INTEGRATED CONTENT-RESOURCE ANALYTIC MODEL - A system and associated method for continuously optimizing data archive management scheduling. A job scheduler receives, from an archive management system, inputs of task information, replica placement data, infrastructure topology data, and resource performance data. The job scheduler models a flow network that represents data content, software programs, physical devices, and communication capacity of the archive management system in various levels of vertices according to the received inputs. An optimal path in the modeled flow network is computed as an initial schedule, and the archive management system performs tasks according to the initial schedule. The operations of scheduled tasks are monitored and the job scheduler produces a new schedule based on feedbacks of the monitored operations and predefined heuristics. | 06-09-2011 |
20110213508 | OPTIMIZING POWER CONSUMPTION BY DYNAMIC WORKLOAD ADJUSTMENT - A system and associated method for optimizing power consumption of a data center by dynamic workload adjustment. A current workload distribution of the data center is shifted to an optimal workload solution that provides acceptable level of service with the least amount of power consumption. The sum of power cost and migration cost that corresponds to the optimal workload solution is the lowest among all sums that correspond to respective candidate workload solutions. The power cost is determined by a maximum temperature of the data center and accompanying cooling cost for each candidate workload solution. The migration cost is determined by performance degradation that occurs during shifting a workload distribution of the data center from the current workload distribution to each candidate workload solution. | 09-01-2011 |
20110231541 | SYSTEM AND METHOD FOR A STORAGE AREA NETWORK VIRTUALIZATION OPTIMIZATION - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer. | 09-22-2011 |
20110258164 | Detecting Inadvertent or Malicious Data Corruption in Storage Subsystems and Recovering Data - Embodiments of the invention detect inadvertent or malicious data corruption and for recovering data including receiving a query specifying corrupted application data; analyzing transaction logs to find update operations related to the data; determining where the data are stored, by mapping the table data to locations within the file system and mapping the file system locations to volume logical blocks; and analyzing snapshot volume bitmaps to determine if the bitmaps show changes to the table data stored in the volume logical blocks. Changes which are reflected in the bitmaps for the data, but which do not have corresponding entries in the transaction logs are flagged as unauthorized changes. Snapshots of the data, from a time prior to the time at which a flagged snapshot was taken, are identified for use in restoring data to its status prior to the unauthorized change. | 10-20-2011 |
20110295815 | Proactive Detection of Data Inconsistencies in a Storage System Point-in-Time Copy of Data - Embodiments of the invention relate to testing a storage system point-in-time copy of data for consistency. An aspect of the invention includes receiving system and application event information from systems and applications associated with point-in-time copies of data. The system and application event information is associated with each of point-in-time copies of data. At least one point-in-time copy of data is selected for testing. The system and application event information is compared with inconsistency classes to determine tests for testing the point-in-time copy of data. The point-in-time copy of data is tested. | 12-01-2011 |
20120079097 | PROACTIVE IDENTIFICATION OF HOTSPOTS IN A CLOUD COMPUTING ENVIRONMENT - The present invention proactively identifies hotspots in a cloud computing environment through cloud resource usage models that use workload parameters as inputs. In some embodiments the cloud resource usage models are based upon performance data from cloud resources and time series based workload trend models. Hotspots may occur and can be detected at any layer of the cloud computing environment, including the server, storage, and network level. In a typical embodiment, parameters for a workload are identified in the cloud computing environment and inputted into a cloud resource usage model. The model is run with the inputted workload parameters to identify potential hotspots, and resources are then provisioned for the workload so as to avoid these hotspots. | 03-29-2012 |
20120109907 | ON-DEMAND DATA DEDUPLICATION - Embodiments of the invention relate to performing on-demand data deduplication for managing data and storage space. Redundant data in a system is detected. Availability of data storage space in the system is periodically evaluated. Performance parameters of the system are evaluated. Detected redundant data is selected based on the data storage availability and performance parameters of the system. If at least a portion of the selected redundant data is to be deduplicated is determined. | 05-03-2012 |
20120116743 | OPTIMIZING STORAGE CLOUD ENVIRONMENTS THROUGH ADAPTIVE STATISTICAL MODELING - Embodiments of the present invention provide an approach for adapting an information extraction middleware for a clustered computing environment (e.g., a cloud environment) by creating and managing a set of statistical models generated from performance statistics of operating devices within the clustered computing environment. This approach takes into account the required accuracy in modeling, including computation cost of modeling, to pick the best modeling solution at a given point in time. When higher accuracy is desired (e.g., nearing workload saturation), the approach adapts to use an appropriate modeling algorithm. Adapting statistical models to the data characteristics ensures optimal accuracy with minimal computation time and resources for modeling. This approach provides intelligent selective refinement of models using accuracy-based and operating probability-based triggers to optimize the clustered computing environment, i.e., maximize accuracy and minimize computation time. | 05-10-2012 |
20120221745 | SYSTEM AND METHOD FOR A STORAGE AREA NETWORK VIRTUALIZATION OPTIMIZATION - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer. | 08-30-2012 |
20120271678 | CHARGEBACK REDUCTION PLANNING FOR INFORMATION TECHNOLOGY MANAGEMENT - Minimizing cost chargeback in an information technology (IT) computing environment including multiple resources. One implementation involves determining time-based usage patterns and allocation statistics for a plurality of resources and associated resource workloads. Using a regression function for determining a correlation of response time with resource usages and outstanding input/output instructions for the plurality of resources. Based on the time-based usage patterns, allocation statistics and the correlation, deriving an interpolation using positive and negative integrals to minimize a difference between allocated resource values and average allocation values. Determining service level objectives (SLOs) and resource allocation for minimizing cost chargeback for the resource workloads based on the derived interpolation. | 10-25-2012 |
20120304182 | CONTINUOUS OPTIMIZATION OF ARCHIVE MANAGEMENT SCHEDULING BY USE OF INTEGRATED CONTENT-RESOURCE ANALYTIC MODEL - A system and associated method for continuously optimizing data archive management scheduling. A job scheduler receives, from an archive management system, inputs of task information, replica placement data, infrastructure topology data, and resource performance data. The job scheduler models a flow network that represents data content, software programs, physical devices, and communication capacity of the archive management system in various levels of vertices according to the received inputs. An optimal path in the modeled flow network is computed as an initial schedule, and the archive management system performs tasks according to the initial schedule. The operations of scheduled tasks are monitored and the job scheduler produces a new schedule based on feedbacks of the monitored operations and predefined heuristics. | 11-29-2012 |
20120330895 | TRANSITIONING APPLICATION REPLICATION CONFIGURATIONS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for providing non-disruptive transitioning of application replication configurations and proactive analysis of possible error scenarios. Specifically, under embodiments of the present invention, a common integration model (CIM)-compatible representation of a system replication plan is provided in a computer data structure. Based on the representation, a hierarchical tree data structure having a set of nodes is created. A set of system configuration updates pertaining to the set of nodes are then classified (e.g., based upon the type of configuration update). Once the set of nodes has been classified, the set of nodes may then be analyzed to determine if any nodes of the set are isomorphic. If so, the plan can be modified accordingly. In any event, the replication plan (or modified replication plan) may then be implemented. | 12-27-2012 |
20130006943 | HYBRID DATA BACKUP IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide a hybrid (e.g., local and remote) approach for data backup in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a set of storage configuration parameters corresponding to a set of data to be backed up is received and stored in a computer data structure. The set of storage configuration parameters can comprise at least one of the following: a recovery time objective (RTO), a recovery point objective (RPO), and a desired type of protection for the set of data. Regardless, the set of data is compared to previously stored data to identify at least one of the following: portions of the set of data that have commonality with the previously stored data; and portions of the set of data that are unique to the set of data (i.e., not in common with any of the previously stored data). The above-described process is referred to herein as “de-duplication”. A storage solution is then determined based on the set of storage configuration parameters. In general, the storage solution identifies at least one local storage resource and at least one remote storage resource (e.g., a cloud storage resource) for backing up the portions of the set of data that are unique to the set of data. Once the storage solution has been determined, the unique portions of the set of data will be stored in accordance therewith. | 01-03-2013 |
20130110793 | DATA DE-DUPLICATION IN COMPUTER STORAGE SYSTEMS | 05-02-2013 |
20130261826 | OPTIMIZING POWER CONSUMPTION BY DYNAMIC WORKLOAD ADJUSTMENT - A method and system for optimizing power consumption of a data center by dynamic workload adjustment. At least one candidate workload solution for the data center is generated. Each candidate workload solution represents a respective application map that specifies a respective workload distribution among application programs of the data center. Workload of the data center is dynamically adjusted from a current workload distribution to an optimal workload solution. The optimal workload solution is a candidate workload solution of the at least one candidate workload solution having a lowest sum of a respective power cost and a respective migration cost. Dynamically adjusting the workload of the data center includes: estimating a respective overall cost of each candidate workload solution, selecting the optimal workload solution that has a lowest overall cost as determined from the estimating, and transferring the optimal workload solution to devices of a computer system for deployment. | 10-03-2013 |
20130290258 | TRANSITIONING APPLICATION REPLICATION CONFIGURATIONS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for providing non-disruptive transitioning of application replication configurations and proactive analysis of possible error scenarios. Specifically, under embodiments of the present invention, a common integration model (CIM)-compatible representation of a system replication plan is provided in a computer data structure. Based on the representation, a hierarchical tree data structure having a set of nodes is created. A set of system configuration updates pertaining to the set of nodes are then classified (e.g., based upon the type of configuration update). Once the set of nodes has been classified, the set of nodes may then be analyzed to determine if any nodes of the set are isomorphic. If so, the plan can be modified accordingly. In any event, the replication plan (or modified replication plan) may then be implemented. | 10-31-2013 |
20130333000 | SYSTEM AND METHOD FOR A STORAGE AREA NETWORK VIRTUALIZATION OPTIMIZATION - A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming instructions are operable to determine one or more optimal mappings between a server layer and a storage layer through a network layer based on performance metrics of one or more ports of at least one of the server layer, the storage layer and the network layer. | 12-12-2013 |