Patent application number | Description | Published |
20080201366 | CHANGED FILES LIST WITH TIME BUCKETS FOR EFFICIENT STORAGE MANAGEMENT - There is provided, in a computer processing system, an apparatus for managing object data. The apparatus includes a changed objects manager for creating and managing a changed objects list that at least identifies the objects that have changed based on time of change. The changed objects list is associated with a plurality of time buckets. Each of the plurality of time buckets is associated with a respective date and time period and with object change records for objects having a timestamp falling within the respective date and time period. Each of the object change records is associated with a unique object identifier and the timestamp for a corresponding one of the objects. The timestamp specifies a date and a time corresponding to a latest one of a creation time or a most recent update time for the corresponding one of the objects. | 08-21-2008 |
20080228687 | Controlling Computer Storage Systems - Goal-based availability and change management are handled over groups of heterogeneous storage controllers. Probabilistic and deterministic methods are employed to determine the allocation and placement of storage volumes to storage controllers, as well as the degree of data redundancy necessary to achieve data availability goals The probabilistic methods can take into account past observations of controller availability, and operator beliefs, as well as the state of storage controller configuration, in coming up with a probabilistic estimate of future availability. | 09-18-2008 |
20080229277 | DATA LOCATIONS TEMPLATE BASED APPLICATION-DATA ASSOCIATION AND ITS USE FOR POLICY BASED MANAGEMENT - Method and system are disclosed for automatically discovering associations between applications and data in multi-tiered distributed systems. The method in one aspect uses a machine-readable specification of a model or template that describes use and transformation of data by software components. The method additionally utilizes a model of system configuration and appropriate runtime support to mine information available from systems management software present in enterprise systems. The application-data association discovery process performs a traversal of the distributed system configuration graph with actions taken during this traversal driven by the contents of the templates for the software components present in the system. The results of the application-data association discovery process are stored in a database and may be used to specify application-specific information lifecycle management (ILM) policy or as input to impact analysis tools in access control and antivirus systems. | 09-18-2008 |
20080235387 | Method and Apparatus for the Dynamic Introduction of New Attributes into Policies - In one aspect this invention provides a computer program embodied on a computer readable medium that is executed by at least one data processor of a policy management system. The computer program includes first computer program instructions for implementing a user interface and second computer program instructions for implementing a policy manager that is coupled to the user interface via a policy repository for introducing a new attribute, using the first computer program instructions, into a policy for a policy-managed system, without requiring a change to (e.g., without having to re-write or re-compile) the second computer program instructions. | 09-25-2008 |
20080270971 | APPLICATION-REQUIREMENT BASED CONFIGURATION DESIGNER FOR DISTRIBUTED COMPUTING SYSTEMS - Techniques for automatically designing an application-requirement based configuration for a distributed computing system are provided. One or more application-level templates are obtained, wherein the one or more templates are representative of one or more requirements associated with one or more applications. Using the one or more application-level templates, one or more logical flows are created. The one or more logical flows are then used to generate one or more system-level configuration plans of the distributed computing system. | 10-30-2008 |
20090012800 | COMPUTER-ASSISTED INFORMATION TECHNOLOGY SERVICE DESIGN SYSTEM - A method and system are disclosed for providing automated assistance to a service provider for creating a technical solution definition for a project for delivering Information Technology (IT) outsourcing services for a customer. The method comprises the steps of providing, in machine processable form, a definition of a taxonomy of a set of standard services offered by the service provider; providing, in machine processable form, a repository of service designs, each of the service designs describing a set of IT architecture components to deliver a service associated with a standard service element, according to a specified best practice rule; and providing, in machine processable form, a collection of policies that can be executed to validate the service designs selected to deliver the set of contracted services. A computer implemented design tool is used to define the scope of a project a set of service designs, and to run policy-based validation checks on the design. | 01-08-2009 |
20090112841 | DOCUMENT SEARCHING USING CONTEXTUAL INFORMATION LEVERAGE AND INSIGHTS - A method and system are disclosed that enable a user to search a large collection of structured and unstructured documents using semantic concepts that the system provides to them, to search the most relevant business activity first, and then using one of the business activities as the additional context to search for specific document or documents that are most relevant. One aspect of the invention provides a methodology to perform concept-based structured search over document collections to obtain search results as business activities and associated relevant documents using the business activity context. The document collections are obtained by aggregating documents corresponding to a business activity. The instances are extracted from the document collections together with any concept-relationship specific heuristics in that domain. Another aspect of the invention enables the enterprise user to enter concepts and instances that define the search parameters using a structured user interface. | 04-30-2009 |
20090150472 | METHOD FOR NON-DISRUPTIVELY ASSOCIATING APPLICATIONS AND MIDDLEWARE COMPONENTS WITH INFORMATION TECHNOLOGY INFRASTRUCTURE - A methodology is presented for discovering and storing end-to-end associations between different types of entities in a system configuration model of a distributed middleware system. First associations are determined, at each distributed system tier, between instances of data and data-container configuration elements. Those first associations point to logical subdivision of a data service that is directly responsible for implementing an instance of data. Second associations are determined, at said each distributed system tier, between said data-container configuration elements and a server infrastructure. Said second associations point to a server infrastructure that hosts said data-container configuration elements. Third associations are composed, within said each distributed system tier, between said instances of data and said server infrastructure, using said first associations and said second associations. Fourth associations are composed, end-to-end, which represent dependency of an application using said instances of data to said server infrastructure. | 06-11-2009 |
20090307174 | CONNECTION OF VALUE NETWORKS WITH INFORMATION TECHNOLOGY INFRASTRUCTURE AND DATA VIA APPLICATIONS AND SUPPORT PERSONNEL - A method and a system for relating of a value network analysis of a mission to a knowledge base of dependencies of data objects, applications and information technology resources required for achieving of such mission, such method used for optimization of provisioning for information technology resources and for prioritizing of control of data and application security and integrity of such mission. | 12-10-2009 |
20090307743 | METHOD TO AUTOMATICALLY MAP BUSINESS FUNCTION LEVEL POLICIES TO IT MANAGEMENT POLICIES - A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed. | 12-10-2009 |
20100319060 | PROCESS AND SYSTEM FOR COMPREHENSIVE IT DISCOVERY WITHOUT CREDENTIALS - A method and system for discovering dependencies, configurations and utilizations among IT resources are disclosed. A discovery team writes a prediscovery script without requesting credentials and sends it to a system administrator (SA) who already has necessary credentials to execute the prediscovery script. Then, the SA reviews the prediscovery script and executes the prediscovery script on a target server. While or after executing the prediscovery script, the target server generates a result of an execution of the prediscovery script and provides the result to an analysis system. The analysis system analyzes and parses the result and generates a user-friendly data (e.g., graph or spreadsheet) that represents the result. Then, the analysis system provides the user-friendly data to the discovery team. The analysis system does not require credentials and does not directly communicate with the target server except receiving the result of the executed prediscovery script from the target server. | 12-16-2010 |
20110166835 | ANALYZING ANTICIPATED VALUE AND EFFORT IN USING CLOUD COMPUTING TO PROCESS A SPECIFIED WORKLOAD - Embodiments of the invention are directed to a method and system for rapidly identifying workloads that are and are not appropriate for transformation and processing on a cloud computing environment. One embodiment comprises a method for providing a user entity with a measurement of at least one of the value which will be realized, and the effort which will be required, if a given workload selected from one or more workloads associated with a user entity is delivered to a cloud computing environment for processing thereby, instead of being processed by the user entity processing system. The method comprises specifying a plurality of attributes, wherein each attribute pertains to a characteristic that the user entity processing system possesses to some extent, with respect to the given workload. The method further comprises acquiring input data for each attribute, wherein input data for a given attribute provides a measurement, on a prespecified scale, that represents the extent to which the user entity processing system possesses the given attribute. The input data for each attribute is employed to derive a corresponding numerical parameter value, which are used in a specified mathematical model to compute a final score, wherein the final score comprises the measurement, selectively, of the value which will be realized, or the effort which will be required. | 07-07-2011 |
20110246376 | COST BENEFIT BASED ANALYSIS SYSTEM FOR NETWORK ENVIRONMENTS - A method, apparatus, and computer program product for planning changes to network data processing systems. A number of processes performed in a current network data processing system and labor used to perform the number processes are identified. Resources in the current network data processing system used by the number of processes are identified. A first cost for labor used to perform the number of processes using the current network data processing system is calculated. A second cost for the resources in the current network data processing system is calculated. A first change in the first cost for labor in a new network data processing system based on a number of changes to the number of processes when the number of processes is performed in the new network data processing system is identified. A second change in the second cost for the resources in the new network data processing system is identified. | 10-06-2011 |
20110296018 | ONTOLOGY BASED RESOURCE PROVISIONING AND MANAGEMENT FOR SERVICES - Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for ontology based resource provisioning and management for services. For example, such an ontology based approach can be utilized in conjunction with a business support system which may be employed in conjunction with a cloud computing environment. | 12-01-2011 |
20110296020 | EXTENSIBLE SUPPORT SYSTEM FOR SERVICE OFFERINGS - Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for implementing an extensible support system for multiple service offerings. For example, such a support system can be a business support system which may be employed in conjunction with a cloud computing environment. | 12-01-2011 |
20120059930 | REACTIVE MONITORING OF GUESTS IN A HYPERVISOR ENVIRONMENT - A system, method and computer program product for detecting and reacting to a network discrepancy within a data center network environment. The method comprises monitoring network traffic between a first computer configured as a first hypervisor inter-networked within the data center network environment and a second computer inter-networked within the data center network environment in order to detect a presence of a predetermined condition representing a presence of the network discrepancy in the data center network environment between a recorded state of the data center network environment and an observed state of the data center network environment. The monitoring includes determining the observed state of the data center network environment using one of: polling, event-based or a combination thereof. The method also comprises rectifying, upon the detection of the presence of the predetermined condition, an effect associated with the presence of the predetermined condition in the data center network environment. | 03-08-2012 |
20120180055 | OPTIMIZING ENERGY USE IN A DATA CENTER BY WORKLOAD SCHEDULING AND MANAGEMENT - Techniques are described for scheduling received tasks in a data center in a manner that accounts for operating costs of the data center. Embodiments of the invention generally include comparing cost-saving methods of scheduling a task to the operating parameters of completing a task—e.g., a maximum amount of time allotted to complete a task. If the task can be scheduled to reduce operating costs (e.g., rescheduled to a time when power is cheaper) and still be performed within the operating parameters, then that cost-saving method is used to create a workload plan to implement the task. In another embodiment, several cost-saving methods are compared to determine the most profitable. | 07-12-2012 |
20120185848 | TASK PRIORITIZATION MANAGEMENT IN A VIRTUALIZED ENVIRONMENT - A method, computer program product, and system for managing tasks for a virtual machine are presented. An amount of resources to perform a task for the virtual machine are identified in response to receiving a request to perform the task for the virtual machine in a set of data processing systems. A set of resources in the set of data processing systems available to complete the task for the virtual machine are identified. A set of priorities for a set of phases of the task are identified. Operations are scheduled on the set of resources to perform the task for the virtual machine based on the set of priorities identified for the set of phases of the task. | 07-19-2012 |
20120221542 | INFORMATION THEORY BASED RESULT MERGING FOR SEARCHING HIERARCHICAL ENTITIES ACROSS HETEROGENEOUS DATA SOURCES - A method, system, and computer program product are disclosed for merging search results. In one embodiment, the method comprises identifying a query, splitting the query into sub-queries, and calculating information content for each of the sub-queries. This method also comprises executing each of the sub-queries to obtain a plurality of search results, and combining the search results based on the information content calculated for the sub-queries. In an embodiment, the execution of each of the sub-queries includes identifying a multitude of search results for at least one of the sub-queries; and the combining includes grouping said multitude of search results into a plurality of clusters, and computing a relevance score for each of said clusters. In the embodiment the combining further includes merging the clusters based on the relevance scores computed for the clusters as well as the information content calculated for the sub-queries. | 08-30-2012 |
20120232864 | Analyzing Anticipated Value and Effort in Using Cloud Computing to Process a Specified Workload - Workloads that are and are not appropriate for transformation and processing on a cloud computing environment are identified. A user entity is provided with a measurement of at least one of the value which will be realized, and the effort which will be required. A plurality of attributes is specified. Input data represents the extent to which the user entity processing system possesses the given attribute. The input data for each attribute is employed to derive a corresponding numerical parameter value, which are to compute a final score. | 09-13-2012 |
20120278488 | METHOD AND APPARATUS FOR PERFORMANCE AND POLICY ANALYSIS IN DISTRIBUTED COMPUTING SYSTEMS - One embodiment of the present method and apparatus for performance and policy analysis in distributed computing systems includes representing a distributed computing system as a state transition model. A queuing network is then superimposed upon the state transition model, and the effects of one or more policies on the distributed computing system performance are identified in accordance with a solution to the queuing network. | 11-01-2012 |
20120284243 | METHOD TO AUTOMATICALLY MAP BUSINESS FUNCTION LEVEL POLICIES TO IT MANAGEMENT POLICIES - A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed. | 11-08-2012 |
20120284389 | METHOD TO AUTOMATICALLY MAP BUSINESS FUNCTION LEVEL POLICIES TO IT MANAGEMENT POLICIES - A method, system, computer program product, and computer program storage device for transforming a high-level policy associated with a high layer to a low-level policy associated with a low layer. Mapping between high-level objects in a high layer and low-level objects in a low layer is derived by an automated discovery tool. The high-level policy is mapped to the low-level policy according to the mapping (e.g., by substituting the high-level objects with the low-level objects and by performing a syntax transformation). In one embodiment, a low-level policy is transformed to a high-level policy according to the mapping. As exemplary embodiments, policy transformations in traffic shaping and data retention are disclosed. | 11-08-2012 |
20120290135 | UNIFIED AND FLEXIBLE CONTROL OF MULTIPLE DATA CENTER COOLING MECHANISMS - Techniques are described for controlling the climate in a data center. Using the input of an administrator, multiple desired attributes of a data center (e.g., temperature, energy consumption, costs, or system performance) may be balanced using a utility function that maximizes the utility of the computing systems in the data center according to the administrator's preferences. Additionally, a cooling model is generated that represents the affect of a control parameter (e.g., the fan speed of a CRAC) on the desire attributes of the data center. The cooling model may then be substituted into the utility function to replace the desired attributes. Using this new utility function, the control parameters may be varied such that the maximum utility is achieved. | 11-15-2012 |
20130013462 | EXTENSIBLE SUPPORT SYSTEM FOR SERVICE OFFERINGS - Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for implementing an extensible support system for multiple service offerings. For example, such a support system can be a business support system which may be employed in conjunction with a cloud computing environment. | 01-10-2013 |
20130019015 | Application Resource Manager over a CloudAANM Devarakonda; Murthy V.AACI PeekskillAAST NYAACO USAAGP Devarakonda; Murthy V. Peekskill NY USAANM Joukov; Nikolai A.AACI ThornwoodAAST NYAACO USAAGP Joukov; Nikolai A. Thornwood NY USAANM Pfitzmann; BirgitAACI ValhallaAAST NYAACO USAAGP Pfitzmann; Birgit Valhalla NY USAANM Potter; ShayaAACI New YorkAAST NYAACO USAAGP Potter; Shaya New York NY US - An application resource manager obtains a projection of upcoming demand for an application that runs on a cloud. The cloud includes at least one of an infrastructure as a service cloud and a platform as a service cloud. The application resource manager determines, based on the projection, that resources of the cloud that are devoted to the application need to be one of extended and shrunken. One of extending and shrinking the resources of the cloud that are devoted to the application is carried out in response to the determining. | 01-17-2013 |
20130085611 | UNIFIED AND FLEXIBLE CONTROL OF MULTIPLE DATA CENTER COOLING MECHANISMS - Techniques are described for controlling the climate in a data center. Using the input of an administrator, multiple desired attributes of a data center (e.g., temperature, energy consumption, costs, or system performance) may be balanced using a utility function that maximizes the utility of the computing systems in the data center according to the administrator's preferences. Additionally, a cooling model is generated that represents the affect of a control parameter (e.g., the fan speed of a CRAC) on the desire attributes of the data center. The cooling model may then be substituted into the utility function to replace the desired attributes. Using this new utility function, the control parameters may be varied such that the maximum utility is achieved. | 04-04-2013 |
20130091285 | DISCOVERY-BASED IDENTIFICATION AND MIGRATION OF EASILY CLOUDIFIABLE APPLICATIONS - Infrastructures of a plurality of existing applications of an entity are analyzed to identify at least one of the infrastructures of the plurality of existing applications which includes existing substructures enabling replication of individual parts via an existing replication mechanism. The at least one of the infrastructures is selected for migration to a cloud. The cloud includes at least one of an infrastructure as a service cloud and a platform as a service cloud. The existing substructures of the at least one of the infrastructures are migrated to the cloud, without application-level change. A business agility component is assembled and is configured to control extending and shrinking resources of the cloud that are devoted to the at least one of the infrastructures. The resources of the cloud that are devoted to the at least one of the infrastructures are extended and shrunk, using the business agility component. | 04-11-2013 |
20130104136 | OPTIMIZING ENERGY USE IN A DATA CENTER BY WORKLOAD SCHEDULING AND MANAGEMENT - Techniques are described for scheduling received tasks in a data center in a manner that accounts for operating costs of the data center. Embodiments of the invention generally include comparing cost-saving methods of scheduling a task to the operating parameters of completing a task—e.g., a maximum amount of time allotted to complete a task. If the task can be scheduled to reduce operating costs (e.g., rescheduled to a time when power is cheaper) and still be performed within the operating parameters, then that cost-saving method is used to create a workload plan to implement the task. In another embodiment, several cost-saving methods are compared to determine the most profitable. | 04-25-2013 |
20130238780 | MANAGING RISK IN RESOURCE OVER-COMMITTED SYSTEMS - Risk associated with over-committing shared resources is determined. In response to receiving a request to provision a new workload, a candidate mix of virtual machines is selected from plurality of virtual machines already running on a cloud infrastructure. A utilization profile is then created for an aggregate behavior of the candidate mix of virtual machines and a new virtual machine running the new workload. A risk inherent in over-commitment if the new workload is grouped with the candidate mix of virtual machines is determined, and whether that risk is acceptable. If the risk is acceptable, the new workload is provisioned by over-committing the candidate mix of virtual machines with the new virtual machine running on the cloud infrastructure. | 09-12-2013 |
20130297610 | CHANGED FILES LIST WITH TIME BUCKETS FOR EFFICIENT STORAGE MANAGEMENT - There is provided, in a computer processing system, an apparatus for managing object data. The apparatus includes a changed objects manager for creating and managing a changed objects list that at least identifies the objects that have changed based on time of change. The changed objects list is associated with a plurality of time buckets. Each of the plurality of time buckets is associated with a respective date and time period and with object change records for objects having a timestamp falling within the respective date and time period. Each of the object change records is associated with a unique object identifier and the timestamp for a corresponding one of the objects. The timestamp specifies a date and a time corresponding to a latest one of a creation time or a most recent update time for the corresponding one of the objects. | 11-07-2013 |
20140047120 | ONTOLOGY BASED RESOURCE PROVISIONING AND MANAGEMENT FOR SERVICES - Techniques are disclosed for integration, provisioning and management of entities and processes in a computing system such as, by way of example only, business entities and business processes. In particular, techniques are disclosed for ontology based resource provisioning and management for services. For example, such an ontology based approach can be utilized in conjunction with a business support system which may be employed in conjunction with a cloud computing environment. | 02-13-2014 |