Patent application number | Description | Published |
20080235080 | Performance Prediction Service Using Business-Process Information - Performance prediction techniques are provided that utilize business-process information such as transaction history and log information. For example, in one aspect of the invention, a computer-based technique for providing a performance prediction service comprises the following steps/operations. First, business-process information associated with a business is obtained. Then, a performance estimation function is generated based at least in part on the business-process information, the performance estimation function being usable in responding to a query obtained from a potential customer of the business. | 09-25-2008 |
20080235168 | POLICY-BASED MANAGEMENT SYSTEM WITH AUTOMATIC POLICY SELECTION AND CREATION CAPABILITIES BY USING SINGULAR VALUE DECOMPOSITION TECHNIQUE - A statistical approach implementing Singular Value Decomposition (SVD) to a policy-based management system for autonomic and on-demand computing applications. The statistical approach empowers a class of applications that require policies to handle ambiguous conditions and allow the system to “evolve” in response to changing operation and environment conditions. In the system and method providing the statistical approach, observed event-policy associated data, which is represented by an event-policy matrix, is treated as a statistical problem with the assumption that there are some underlying or implicit higher order correlations among events and policies. The SVD approach enables such correlations to be modeled, extracted and modified. From these correlations, recommended policies can be selected or created without exact match of policy conditions. With a feedback mechanism, new knowledge can be acquired as new situations occur and the corresponding policies to manage them are recorded and used to generate new event and policy correlations. Consequently, based on these new correlations, new recommended policies can be derived. | 09-25-2008 |
20080235387 | Method and Apparatus for the Dynamic Introduction of New Attributes into Policies - In one aspect this invention provides a computer program embodied on a computer readable medium that is executed by at least one data processor of a policy management system. The computer program includes first computer program instructions for implementing a user interface and second computer program instructions for implementing a policy manager that is coupled to the user interface via a policy repository for introducing a new attribute, using the first computer program instructions, into a policy for a policy-managed system, without requiring a change to (e.g., without having to re-write or re-compile) the second computer program instructions. | 09-25-2008 |
20080256534 | METHOD FOR IMPROVED IMAGE-CUSTOMIZATION BY USE OF EMBEDDED METADATA - The present invention relates to a method for the customization of virtual machine images. The method comprises identifying and retrieving a virtual machine image template. A customized virtual machine image is created from the virtual machine image template. The customized virtual machine image template being created by identifying at least one file-system or memory image that is associated with the virtual machine image template, identifying within the at least one file-system or memory image at least one data set, wherein the at least one data set comprises metadata. The metadata contains information detailing the required execution context customization aspects for at least one specified image subset of the virtual machine. Execution context-specific information that is required to customize the image subset of the virtual machine is retrieved. Further, the image subset of the virtual machine is modified in accordance with the retrieved execution context-specific information. | 10-16-2008 |
20080256633 | Method and Apparatus for Determination of the Non-Replicative Behavior of a Malicious Program - Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity. The result of the analysis can also be used for informing a user of an anti-virus system of the non-replicative changes made to the environment. | 10-16-2008 |
20080271016 | HYPERVISOR WITH CLONING-AWARENESS NOTIFICATIONS - A method, information processing system, and computer readable medium for managing virtual machine imaging. The method includes receiving a request for an imaging operation associated with at least one virtual machine. A notification is sent to at least one operating system associated with the at least one virtual machine of the request for the imaging operation. The operating system is determined to be in a state for the virtual machine to be imaged. The request for the imaging operation is granting in response to determining. | 10-30-2008 |
20080301630 | MECHANISM TO PROVIDE DEBUGGING AND OPTIMIZATION IN POLICY AND KNOWLEDGE CONTROLLED DISTRIBUTED COMPUTING SYSTEMS, THROUGH THE USE OF TAGGED POLICIES AND KNOWLEDGE REPRESENTATION ELEMENTS - A mechanism to provide debugging and optimization in policy and knowledge controlled distributed computing system through the use of tagged policies is provided. An aspect of the mechanism tags one or more policies, for instance, at their creation time, execution time and/or at any other time an event that affects the policies occur. Decisions made according to policy execution or evaluation may be traced using the tags. | 12-04-2008 |
Patent application number | Description | Published |
20080235705 | Methods and Apparatus for Global Systems Management - Techniques for globally managing systems are provided. One or more measurable effects of at least one hypothetical action to achieve a management goal are determined at a first system manager. The one or more measurable effects are sent from the first system manager to a second system manager. At the second system manager, one or more procedural actions to achieve the management goal are determined in response to the one or more received measurable effects. The one or more procedural actions are executed to achieve the management goal. | 09-25-2008 |
20080270199 | METHODS AND APPARATUS FOR MANAGEMENT OF HETEROGENEOUS WORKLOADS - Systems and methods for managing a system of heterogeneous workloads are provided. Work that enters the system is separated into a plurality of heterogeneous workloads. A plurality of high-level quality of service goals is gathered. At least one of the plurality of high-level quality of service goals corresponds to each of the plurality of heterogeneous workloads. A plurality of control functions are determined that are provided by virtualizations on one or more containers in which one or more of the plurality of heterogeneous workloads run. An expected utility of a plurality of settings of at least one of the plurality of control functions is determined in response to the plurality of high-level quality of service goals. At least one of the plurality of control functions is exercised in response to the expected utility to effect changes in the behavior of the system. | 10-30-2008 |
20090106669 | METHOD AND APPARATUS FOR VIRTUAL WORLD BASED PRODUCT DESIGN - Systems and methods are provided for conducting the entire development process of new products, such as clothing or fashion designs, from conception through production in a virtual world. The virtual world is a multi-user three-dimensional persistent interactive graphical environment in which a plurality of avatars can interact as if interacting in the physical world to develop a new product. The avatars represent actual individuals that are contributors to the product development process. Each avatar can communicate with other avatars, can interact with and modify the graphical environment and can manipulate three-dimensional objects within the graphical environment for purposes of demonstration, explanation or review. Databases containing the necessary elements for product design are provided and are accessible by the avatars within the graphical environment. | 04-23-2009 |
20090106748 | METHOD AND SYSTEM FOR UPGRADING VIRTUAL RESOURCES - A system for upgrading a multi-tiered application. In response to receiving a request to upgrade a multi-tiered application, wherein components of the multi-tiered application are deployed across a plurality of virtual machines, an appropriate integrated patch is selected for the upgrade. The selected integrated patch includes an integrated set of patches for the components of the multi-tiered application, state update data, and order constraints. The components of the multi-tiered application specified in the selected integrated patch are upgraded by using the integrated set of patches and order constraints. In addition, the state of the components of the multi-tiered application are updated by using the state update data. Then, the updated state of the multi-tiered application is saved to storage. | 04-23-2009 |
20120203912 | Autonomic computing system with model transfer - Methods and systems are provided for autonomic control and optimization of computing systems. A plurality of component models for one or more components in an autonomic computing system are maintained in a system level database. These component models are obtained from a source external to the management server including the components associated with the models. Component models are added or removed from the database or updated as need. A system level management server in communication with the database utilizes the component models maintained in the system level database and generic component models as needed to compute an optimum state of the autonomic computing system. The autonomic computing system is managed in accordance with the computed optimum state. | 08-09-2012 |
Patent application number | Description | Published |
20100267622 | Methods to activate or block the HLA-E/Qa-1 restricted CD8+ T cell regulatory pathway to treat immunological disease - Methods are provided for inhibiting or enhancing down-regulation of an antigen-activated HLA-E+ T cell by an HLA-E-restricted CD8+ T cell comprising contacting the HLA-E* T cell and CD8+ T cell with an agent which inhibits or enhances, respectively, binding between (i) T cell receptor (TCR) on the surface of the CD8+ T cell and (ii) a self peptide presented by HLA-E on the surface of the HLA-E+ T cell, thereby inhibiting or enhancing, respectively, down-regulation of the antigen-activated HLA-E+ T cell. Compositions comprising agents which inhibit or enhance/activate, respectively, binding between (i) T cell receptor (TCR) on the surface of a CD8+ T cell and (ii) a self peptide presented by HLA-E on the surface of a HLA-E+ T cell, and assays for identifying such agents, are provided. | 10-21-2010 |
20120029473 | USE OF 5C8 MAB AND DIRECT INDUCTION OF REGULATORY CD8+ T CELLS TO ESTABLISH PERMANENT AND SPECIFIC TRANSPLANTATION TOLERANCE - A method is provided for preventing rejection by an immune system of a recipient subject of a tissue transplanted from a donor subject into the recipient subject without the need for long-term administration of non-specific immunosuppressive drugs. | 02-02-2012 |
20120183518 | ASSAY FOR DETERMINING HEALTH OF CD8+ T CELLS - A method of determining if a subject's CD8+ T-cells functionally recognize an HLA-E/Hsp60sp target structure comprising a) contacting a sample of the subject's CD8+ T-cells with a HLA-E+ cell loaded with Hsp60sp, b) quantifying proliferation of the contacted HLA-E+ cell, c) contacting a sample of the subject's CD8+ T-cells with a HLA-E+ cell which is loaded with a peptide which does not bind to HLA-E, d) quantifying proliferation of the HLA-E+ cell loaded with the peptide which does not bind to HLA-E following contact with the subject's CD8+ T-cells, e) comparing the proliferation quantified in step d) with the proliferation quantified in step b) | 07-19-2012 |
20130209498 | Methods to activate or block the HLA-E/Qa-1 restricted CD8+ T cell regulatory pathway to treat immunological disease - Methods are provided for inhibiting or enhancing down-regulation of an antigen-activated HLA-E | 08-15-2013 |