Patent application number | Description | Published |
20090012800 | COMPUTER-ASSISTED INFORMATION TECHNOLOGY SERVICE DESIGN SYSTEM - A method and system are disclosed for providing automated assistance to a service provider for creating a technical solution definition for a project for delivering Information Technology (IT) outsourcing services for a customer. The method comprises the steps of providing, in machine processable form, a definition of a taxonomy of a set of standard services offered by the service provider; providing, in machine processable form, a repository of service designs, each of the service designs describing a set of IT architecture components to deliver a service associated with a standard service element, according to a specified best practice rule; and providing, in machine processable form, a collection of policies that can be executed to validate the service designs selected to deliver the set of contracted services. A computer implemented design tool is used to define the scope of a project a set of service designs, and to run policy-based validation checks on the design. | 01-08-2009 |
20090254391 | USE OF HISTORICAL DATA IN A COMPUTER-ASSISTED TECHNICAL SOLUTION DESIGN TOOL - A method and system are disclosed for re-using, across plural customer accounts, information generated as part of technical solution designs by a service provider for delivering Information Technology (IT) outsourcing services to customers. The method comprises the step of providing a set of standard service elements and a set of standard service designs. The method comprises the further steps of customizing one or more of the standard service designs to generate customized service designs, generating custom service elements, and generating custom service designs associated with them. The custom service elements and service designs, and the customized service designs are stored in a tool-specific metadata repository that is accessed to promote reuse of the customizations across plural customer accounts. Usage statistics are utilized to identify when non-standard service elements and designs should be promoted to standard ones, and data mining techniques are used to infer policies associated with the non-standard service designs. | 10-08-2009 |
20100325500 | Detecting and Recovering from Silent Data Errors in Application Cloning Systems - A method, system, and article for resolving a silent error is disclosed. A primary program copy runs on a primary host, and a secondary program copy runs on a secondary host. The primary and secondary copies communicate to maintain synchronized execution. A third copy of the data is stored on a storage device as a write operations log and maintained in memory on the primary host while the program is running. The primary copy is synchronized with the secondary copy by computing a first checksum of data on the primary host in response to a read operation local to the primary host, computing a second checksum of data on the secondary host in response to a read operation local to the secondary host, and periodically communicating the first checksum to the secondary host, and resolving any discrepancies between the first and second checksum of data reflecting a silent data error. | 12-23-2010 |
20110099360 | Addressing Node Failure During A Hyperswap Operation - A method, system, and article are provided to enable a Hyperswap operation in a clustered computer system. Each node in the system is configured with flash memory, with a hierarchical list of boot volumes therein. Following a Hyperswap operation, the current boot volume is communicated to each node in the cluster and each node joining the cluster. All previously inactive nodes that were booted from the improper boot volume are re-booted from the correct and the flash memory is amended to reflect the correct boot volume. | 04-28-2011 |
20110235909 | ANALYZING DOCUMENTS USING STORED TEMPLATES - A method, a system and a computer program product for analyzing a document are disclosed. In response to receiving the document, the document is partitioned into a plurality of segments using a set of pre-defined attributes. The plurality of segments of the document is mapped with corresponding segments of at least one template selected from a set of stored templates. A first template from the set of stored templates is selected and a group of segments in the first template is identified by computing at least one of a structural similarity and a textual similarity associated with the group of segments compared with the plurality of segments of the document. A subset of segments from the group of segments is aligned with corresponding segments from the plurality of segments of the document. A set of scores is computed using a set of pre-defined criteria, in response to the mapping. The document is analyzed based on the computed set of scores. | 09-29-2011 |
20110258306 | Lock acquisition among node of divided cluster - The acquisition of a lock among nodes of a divided cluster is disclosed. A method is performable by each of at least one node of the cluster. A node waits for a delay corresponding to its identifier. The node asserts intent to acquire the lock by writing its identifier to X and Y variables where another node has failed to acquire the lock. The node waits for another node to acquire the lock where the other node has written to X, and proceeds where Y remains equal to its own identifier. The node waits for another node to acquire the lock where the other node has written to a Z variable, and writes its own identifier to Z and proceeds where the other node has failed. The node writes a value to Y indicating that it is acquiring the lock, and maintains acquisition by periodically writing to Z. | 10-20-2011 |
20120059930 | REACTIVE MONITORING OF GUESTS IN A HYPERVISOR ENVIRONMENT - A system, method and computer program product for detecting and reacting to a network discrepancy within a data center network environment. The method comprises monitoring network traffic between a first computer configured as a first hypervisor inter-networked within the data center network environment and a second computer inter-networked within the data center network environment in order to detect a presence of a predetermined condition representing a presence of the network discrepancy in the data center network environment between a recorded state of the data center network environment and an observed state of the data center network environment. The monitoring includes determining the observed state of the data center network environment using one of: polling, event-based or a combination thereof. The method also comprises rectifying, upon the detection of the presence of the predetermined condition, an effect associated with the presence of the predetermined condition in the data center network environment. | 03-08-2012 |
20120151272 | ADDING SCALABILITY AND FAULT TOLERANCE TO GENERIC FINITE STATE MACHINE FRAMEWORKS FOR USE IN AUTOMATED INCIDENT MANAGEMENT OF CLOUD COMPUTING INFRASTRUCTURES - A scalable and fault tolerant finite state machine engine, for example, for use in an automated incident management system, logs or records data in persistent storage at different points or levels during various internal processing of an event associated with an information technology element, and action taken associated with the event, by executing a finite state machine instance that encodes policies for handling incidents on such types of information technology elements. In the event that the finite state machine engine is shutdown during processing, the finite state machine engine is able to pick up from where it left off when it was shutdown, for each abnormally terminated finite state machine instance, by using the data logged in the persistent storage and determining a point of processing from where it should continue its execution. | 06-14-2012 |
20120221542 | INFORMATION THEORY BASED RESULT MERGING FOR SEARCHING HIERARCHICAL ENTITIES ACROSS HETEROGENEOUS DATA SOURCES - A method, system, and computer program product are disclosed for merging search results. In one embodiment, the method comprises identifying a query, splitting the query into sub-queries, and calculating information content for each of the sub-queries. This method also comprises executing each of the sub-queries to obtain a plurality of search results, and combining the search results based on the information content calculated for the sub-queries. In an embodiment, the execution of each of the sub-queries includes identifying a multitude of search results for at least one of the sub-queries; and the combining includes grouping said multitude of search results into a plurality of clusters, and computing a relevance score for each of said clusters. In the embodiment the combining further includes merging the clusters based on the relevance scores computed for the clusters as well as the information content calculated for the sub-queries. | 08-30-2012 |
20120331342 | ADDING SCALABILITY AND FAULT TOLERANCE TO GENERIC FINITE STATE MACHINE FRAMEWORKS FOR USE IN AUTOMATED INCIDENT MANAGEMENT OF CLOUD COMPUTING INFRASTRUCTURES - A scalable and fault tolerant finite state machine engine, for example, for use in an automated incident management system, logs or records data in persistent storage at different points or levels during various internal processing of an event associated with an information technology element, and action taken associated with the event, by executing a finite state machine instance that encodes policies for handling incidents on such types of information technology elements. In the event that the finite state machine engine is shutdown during processing, the finite state machine engine is able to pick up from where it left off when it was shutdown, for each abnormally terminated finite state machine instance, by using the data logged in the persistent storage and determining a point of processing from where it should continue its execution. | 12-27-2012 |
20130283087 | Automated Fault and Recovery System - A mechanism is provided for handling incidents occurring in a managed environment. An incident is detected in a resource in the managed environment. A set of incident handling actions are identified based on incident handling rules for an incident type of the incident. From the set of incident handling actions, one incident handling action is identified to be executed based on a set of impact indicators associated with the set of incident handling rules. The identified incident handling action is then executed to address the failure of the resource. | 10-24-2013 |
20130283088 | Automated Fault and Recovery System - A mechanism is provided for handling incidents occurring in a managed environment. An incident is detected in a resource in the managed environment. A set of incident handling actions are identified based on incident handling rules for an incident type of the incident. From the set of incident handling actions, one incident handling action is identified to be executed based on a set of impact indicators associated with the set of incident handling rules. The identified incident handling action is then executed to address the failure of the resource. | 10-24-2013 |
20130283266 | Remediating Resource Overload - A method, an apparatus and an article of manufacture for remediating overload in an over-committed computing environment. The method includes measuring resource usage of each of multiple virtual machines on each of at least one hypervisor in a computing environment, upon detection of a resource overload on one of the at least one hypervisor, determining at least one operation that is to be taken for at least one of the multiple virtual machines on the hypervisor to remediate resource overload while increasing values of running virtual machines, and sending a command to the hypervisor to issue the at least one operation. | 10-24-2013 |
20130305080 | Real-Time Event Storm Detection in a Cloud Environment - A method, an apparatus and an article of manufacture for detecting an event storm in a networked environment. The method includes receiving a plurality of events via a plurality of probes in a networked environment, each of the plurality of probes monitoring a monitored information technology (IT) element, aggregating the plurality of events received into an event set, and correlating the plurality of events in the event set to determine whether the plurality of events are part of an event storm by determining if the plurality of events in the event set meet one or more event storm criteria. | 11-14-2013 |
20140222745 | Dynamic Model-Based Analysis of Data Centers - Techniques for model-based analysis of a data center. A method includes creating a metamodel based on domain knowledge to represent a type of object and/or relationship of a data center, using static and dynamic configuration and data analysis techniques to discover topology of elements of the data center and represent the topology as a model that is an instance of the metamodel, using the model to perform analysis of the data center in connection with a specified task, leveraging domain knowledge represented in nodes of the metamodel to guide the analysis in terms of determining guidelines to apply to each node and determining relationships to traverse to continue the analysis, extending the domain knowledge by updating the metamodel upon discovery of additional knowledge for use in improving analysis tasks, and extending the model on-demand using dynamic analysis techniques upon detection of multiple analysis failures. | 08-07-2014 |