摘要:
A method, information processing system, and computer program product manage virtual machine migration. A virtual machine is selected from a set of virtual machines. Each physical machine in a plurality of physical machines is analyzed with respect to a first set of migration constraints associated with the virtual machine that has been selected. A set of physical machines in the plurality of physical machines that satisfy the first set of migration constraints is identified. A migration impact factor is determined for each physical machine in the set of physical machines that has been identified based on a second set of migration constraints associated with the virtual machine that has been selected. A physical machine is selected from the set of physical machines with at least a lowest migration impact factor on which to migrate the virtual machine that has been selected in response to determining the migration impact factor.
摘要:
A method, information processing system, and computer program product manage virtual machine migration. A virtual machine is selected from a set of virtual machines. Each physical machine in a plurality of physical machines is analyzed with respect to a first set of migration constraints associated with the virtual machine that has been selected. A set of physical machines in the plurality of physical machines that satisfy the first set of migration constraints is identified. A migration impact factor is determined for each physical machine in the set of physical machines that has been identified based on a second set of migration constraints associated with the virtual machine that has been selected. A physical machine is selected from the set of physical machines with at least a lowest migration impact factor on which to migrate the virtual machine that has been selected in response to determining the migration impact factor.
摘要:
A mechanism is provided for reassigning virtual machines to resources in a computing environment. Monitoring data is collected about virtual machine request history and resource usage in a form of time series for measured indicators. Forecasted time series are computed for the measured indicators over a time window by utilizing time series forecasting. A new assignment is computed by executing a snapshot based assignment algorithm on the forecasted time series. The new assignment is used for reassignment of virtual machines on the resources in the computing environment.
摘要:
A network-centric modeling mechanism is provided for updating network models in order to mitigate network issues. The network-centric modeling mechanism determines for each component in a plurality of components whether a system parameter in a set of parameters particular to the component has deviated from a predicted system parameter value in a set of predicted system parameter values past a predetermined threshold. Responsive to the system parameter deviating from the predicted system parameter value past the predetermined threshold, the network-centric modeling mechanism generates an event stream indicating a sufficient deviation. The network-centric modeling mechanism determines whether the event stream matches a previous pattern. Responsive to identifying the previous pattern that matches the event stream, the network-centric modeling mechanism preemptively mitigates any related issues in the component or in a related component in the plurality of components using topology-aware indices associated with the previous pattern.
摘要:
A mechanism is provided for reassigning virtual machines to resources in a computing environment. Monitoring data is collected about virtual machine request history and resource usage in a form of time series for measured indicators. Forecasted time series are computed for the measured indicators over a time window by utilizing time series forecasting. A new assignment is computed by executing a snapshot based assignment algorithm on the forecasted time series. The new assignment is used for reassignment of virtual machines on the resources in the computing environment.
摘要:
Methods and apparatus for managing quality of service of computing resources are presented. For example, a method implemented on a processor for managing quality of service of computing resources includes identifying, by the processor, one or more devices of a user on a network of the user; obtaining, by the processor, at least one management module for the identified one or more devices; installing the at least one management module in the processor; monitoring, by the processor, the one or more devices of the user for a problem; and determining, by the processor, a domain in which a root cause of the problem resides and, optionally, the root cause of the problem. The management module comprises information pertaining to a corresponding device. Further, the method may detect quality of service (QoS) problems and determine if the problems reside in a user domain or a service provider domain.
摘要:
Methods and apparatus for managing quality of service of computing resources are presented. For example, a method implemented on a processor for managing quality of service of computing resources includes identifying, by the processor, one or more devices of a user on a network of the user; obtaining, by the processor, at least one management module for the identified one or more devices; installing the at least one management module in the processor; monitoring, by the processor, the one or more devices of the user for a problem; and determining, by the processor, a domain in which a root cause of the problem resides and, optionally, the root cause of the problem. The management module comprises information pertaining to a corresponding device. Further, the method may detect quality of service (QoS) problems and determine if the problems reside in a user domain or a service provider domain.
摘要:
A method and system for providing on-line services to a user from a services provider over a wireless cellular network. The cellular network is located between the user and the services provider, and a distributed computer system such as the Internet is located between the services provider and the cellular network for transmitting data between the services provide and the cellular network. In one embodiment, the services provider transmits software and operating characteristics over the distributed computer system to the cellular network, and the cellular network installs this software on one or more nodes of the network. When a user connects to the cellular network for services from the service provider, the network operates the software on the one or more nodes in accordance with the operating characteristics, to provide one or more services from this one or more nodes to the user from the service provider.
摘要:
Described herein are methods, systems, apparatuses and products for predictive placement of content through network analysis. An aspect provides for intercepting content upload data provided by one or more users indicating content at a network location; ascertaining one or more users predicted to access said content based on said one or more users providing said content upload data; and placing said content to one or more other network locations based on said one or more users predicted to access said content. Other embodiments are disclosed.
摘要:
A method and system is provided for autonomously downloading and indexing Hidden Web pages from Websites having site-specific search interfaces. The method may be implemented using a crawler program or the like to autonomously cull Hidden Web content. The method includes the steps of selecting a query term and issuing a query to a site-specific search interface containing Hidden Web pages. A results index is then acquired and the Hidden Web pages are downloaded from the results index. A plurality of potential query terms are then identified from the downloaded Hidden Web pages. The efficiency of each potential query term is then estimated and a next query term is selected from the plurality of potential query terms, wherein the next selected query term has the greatest efficiency. The next selected query term is then issued to the site-specific search interface using the next query term. The process is repeated until all or most of the Hidden Web pages are discovered. In one aspect of the invention, the efficiency of each potential query term is expressed as a ratio of number of new documents returned for the potential query term to the cost associated with issuing the potential query.