Patent application number | Description | Published |
20130086269 | COLLABORATIVE MANAGEMENT OF SHARED RESOURCES - Collaborative management of shared resources is implemented by a storage server receiving, from a first resource manager, notification of a violation for a service provided by the storage server or device coupled to the storage server. The storage server further receives, from each of a plurality of resource managers, an estimated cost of taking a corrective action to mitigate the violation and selects a corrective action proposed by one of the plurality of resource managers based upon the estimated cost. The storage server directs the resource manager that proposed the selected corrective action to perform the selected corrective action. | 04-04-2013 |
20130086324 | INTELLIGENCE FOR CONTROLLING VIRTUAL STORAGE APPLIANCE STORAGE ALLOCATION - A change in workload characteristics detected at one tier of a multi-tiered cache is communicated to another tier of the multi-tiered cache. Multiple caching elements exist at different tiers, and at least one tier includes a cache element that is dynamically resizable. The communicated change in workload characteristics causes the receiving tier to adjust at least one aspect of cache performance in the multi-tiered cache. In one aspect, at least one dynamically resizable element in the multi-tiered cache is resized responsive to the change in workload characteristics. | 04-04-2013 |
20140143282 | GRAPH TRANSOFRMATIONS TO CORRECT VIOLATIONS OF SERVICE LEVEL OBJECTIONS IN A DATA CENTER - Graph transformations are used by a data management system to correct violations of service-level objectives (SLOs) in a data center. In one aspect, a process is provided to manage a data center by receiving an indication of a violation of a service-level objective associated with the data center from a server in the data center. A graph representation and a transformations data container are retrieved by the data management system from data storage accessible to the data management system. The transformations data container includes one or more transformations. The transformation is processed to create a mutated graph from a data center representation from the graph representation. An option for managing the data center is determined as a result of evaluating the mutated graphs. | 05-22-2014 |
20140223014 | COLLABORATIVE MANAGEMENT OF SHARED RESOURCES - Collaborative management of shared resources is implemented by a storage server receiving, from a first resource manager, notification of a violation for a service provided by the storage server or device coupled to the storage server. The storage server further receives, from each of a plurality of resource managers, an estimated cost of taking a corrective action to mitigate the violation and selects a corrective action proposed by one of the plurality of resource managers based upon the estimated cost. The storage server directs the resource manager that proposed the selected corrective action to perform the selected corrective action. | 08-07-2014 |
20140244643 | WORKLOAD IDENTIFICATION - An embodiment of the invention provides an apparatus and method for classifying a workload of a computing entity. In an embodiment, the computing entity samples a plurality of values for a plurality of parameters of the workload. Based on the plurality of values of each parameter, the computing entity determines a parameter from the plurality of parameters that the computing entity's response time is dependent on. Here, the computing entity's response time is indicative of a time required by the computing entity to respond to a service request from the workload. Further, based on the identified significant parameter, the computing entity classifies the workload of the computing entity by selecting a workload classification from a plurality of predefined workload classifications. | 08-28-2014 |
20140310463 | SYSTEMS AND METHODS FOR TRACKING WORKING-SET ESTIMATES WITH A LIMITED RESOURCE BUDGET - Embodiments of the systems and techniques described here can leverage several insights into the nature of workload access patterns and the working-set behavior to reduce the memory overheads. As a result, various embodiments make it feasible to maintain running estimates of a workload's cacheability in current storage systems with limited resources. For example, some embodiments provide for a method comprising estimating cacheability of a workload based on a first working-set size estimate generated from the workload over a first monitoring interval. Then, based on the cacheability of the workload, a workload cache size can be determined. A cache then can be dynamically allocated (e.g., change, possibly frequently, the cache allocation for the workload when the current allocation and the desired workload cache size differ), within a storage system for example, in accordance with the workload cache size. | 10-16-2014 |
20140380332 | Managing Service Level Objectives for Storage Workloads - Described herein is a system and method for dynamically managing service-level objectives (SLOs) for workloads of a cluster storage system. Proposed states/solutions of the cluster may be produced and evaluated to select one that achieves the SLOs for each workload. A planner engine may produce a state tree comprising nodes, each node representing a proposed state/solution. New nodes may be added to the state tree based on new solution types that are permitted, or nodes may be removed based on a received time constraint for executing a proposed solution or a client certification of a solution. The planner engine may call an evaluation engine to evaluate proposed states, the evaluation engine using an evaluation function that considers SLO, cost, and optimization goal characteristics to produce a single evaluation value for each proposed state. The planner engine may call a modeler engine that is trained using machine learning techniques. | 12-25-2014 |
20150032683 | SYSTEMS AND METHODS FOR HANDLING OF MODELING ERRORS DURING PLANNING - In the area of storage management, service automation can be realized through the use of “MAPE” loop(s). A Planner (P) interacts with the Monitoring (M), Analysis (A) and Execution (E) components in a closed loop. For each new option or potential planning action the Planner (P) invokes the Analysis (A) component. The correctness, as well as effectiveness, of the planning decision is dependent on the Analysis (A) component. Embodiments can utilize an adaptive Analysis (A) component (i.e., an analysis component that can be retrained) that also associates a value of confidence and a corresponding error in the evaluation along with a predicted impact. The Planner (P) component uses this additional information for quoting the final impact of a particular planning action as part of an adaptive MAPE loop to provide improved resource utilization and resource management. | 01-29-2015 |
20150046654 | CONTROLLING A DYNAMICALLY INSTANTIATED CACHE - A change in workload characteristics detected at one tier of a multi-tiered cache is communicated to another tier of the multi-tiered cache. Multiple caching elements exist at different tiers, and at least one tier includes a cache element that is dynamically resizable. The communicated change in workload characteristics causes the receiving tier to adjust at least one aspect of cache performance in the multi-tiered cache. In one aspect, at least one dynamically resizable element in the multi-tiered cache is resized responsive to the change in workload characteristics. | 02-12-2015 |
20150066873 | POLICY BASED DEDUPLICATION TECHNIQUES - Policy based deduplication techniques are described. A deduplication application may manage deduplication operations for a storage system. The deduplication application may comprise, among other elements, a deduplication handler component to receive a deduplication request to perform deduplication operations for a logical container of a storage system. The deduplication application may further comprise a policy manager component to retrieve a data compliance policy associated with the logical container, the data compliance policy to comprise a set of rules to control deduplication operations for the logical container. The deduplication application may still further comprise a deduplication manager component to determine whether to perform deduplication operations for the logical container based on the data compliance policy for the logical container. Other embodiments are described and claimed. | 03-05-2015 |