摘要:
Enabling automated provisioning on a data processing network includes providing the network with access to an automated provisioning controller. The controller enables a user to specify resource allocation priorities and uses the user-specified priorities, in conjunction with a resource stabilization policy, to resolve conflicting resource requests. The resource allocation priorities include priorities for demand-based resource requests and maintenance-based resource requests. The stabilization policy includes a policy for constraining allocation of a resource based on forecasted demand and a policy for constraining allocation of a resource based on a scheduled maintenance task.
摘要:
A method and software for fulfilling a resource request in a data processing network includes specifying characteristics of the requested resource responsive to detecting the resource request. A set of attributes is then derived from the specified characteristics. The specified characteristics indicate broad or general properties of the needed resource while the derived attributes preferably indicate the hardware and software components of a resource ideally suited to fulfill the resource request. Attribute information associated an available resource is then evaluated against the attributes derived from the specified characteristics. An available resource is then selected, based on the evaluation, to satisfy the resource request. The attributes of the selected resource best match the attributes derived from the specified characteristics. The requested resource may be a server resource and specifying the characteristics of the requested resource may includes specifying a server type from a constrained set of server types.
摘要:
Workflows for execution by an autonomic provision management system to yield near clones and replacement systems for a set of targeted computing solutions are provided by determining a common denominator set of workflow steps among the workflows for the targeted computing systems, including workflows to morph a near clone to a specific targeted solution when executed a provisioning management system. Common portions of workflows are identified and archived as workflow templates for re-use in development of new workflows, thus virtualizing the process of subsequent workflow design which use the templates. Multi-level criteria-based searching is provided to workflow designers for finding and re-using existing workflows and workflow templates according to degree of matching common steps, quickest implementation, highest available, or other criteria.
摘要:
Near clones for a set of targeted computing systems are provided by determining a highest common denominator set of components among the computing systems, producing a pseudo-clone configuration definition, and realizing one or more pseudo-clone computing systems as partially configured backups for the targeted computing systems. Upon a planned failover, actual failure, or quarantine action on a targeted computing system, a difference configuration is determined to complete the provisioning of the pseudo-clone system to serve as a replacement system for the failed or quarantined system. Failure predictions can be used to implement the pseudo-clone just prior to an expected first failure of any of the targeted systems. The system can also interface to an on-demand provisioning management system to effect automated workflows to realize pseudo-clones and replacement systems automatically, as needed.
摘要:
A system for establishing and maintaining inventories of computing environment assets comprising one or more custom collector interfaces that detect movement of assets from one environment to another, and an inventory scanner which modifies inventories for each environment based on monitored asset movements. The present invention is of especial benefit to autonomic and on-demand computing architectures.
摘要:
A method, apparatus, and computer instructions for sending a user's availability information to an instant messaging (IM) partner. A user predefines areas of the user's display and associates these predefined areas, or “hotspots”, with user defined messages. If the user is not available to immediately respond to an incoming message, the user may move the IM dialog window to a “hotspot” in the display. Depending upon the user-defined message associated with the “hotspot”, the IM application generates an automated response indicating the user's availability to respond to the message, and sends the message to the IM partner. The user also may predefine and associate the user's IM status with a “hotspot”. Moving an IM dialog window into a “hotspot” automatically changes the user's status based on the associated “hotspot”. This change is communicated to only the particular IM dialog window partner while other IM partners are unaffected.
摘要:
A method, computer program product and system for determining ownership of containers. An installer program may edit stored information, such as ownership, about software component(s) it installed in a container. Upon a subsequent installer program planning to install a software component in that container, software, referred to as a “collector,” may identify the owners of the software components stored in that container. The collector may then search the rules in a rules database to determine the ownership of the container based on the ownership of the software components in the container. By mapping the software components stored in a container with their respective owners, the ownership of a container may be determined.
摘要:
A method, computer program product and system for protecting the location of an installed middleware application. An installer program may generate a private/public key pair at build time of a middleware application. Upon the installer program installing the middleware application, the installation location of the middleware application may be encrypted using the generated private key and then discarding the private key. The encrypted installation location of the middleware application may be decrypted by a subsequent installer program upon receiving a public key from the developer of the middleware application. Since the public key was not shipped with the middleware application, an illegitimate program, such as a Trojan horse, may not be able to decrypt the installation location of the middleware application. Since the public key may only be obtained from the developer of the middleware application, only legitimate programs may be able to decrypt the location of the installed middleware application.
摘要:
A method, apparatus, and computer instructions for allowing areas of a display to be associated with particular instant messaging users. The present invention provides a menu option to allow a user to select whether to have instant messaging dialog windows open up in the same position as the current window, or alternatively, to have the dialog windows from a specific person open up in a specified location on the display. Thus, the instant messaging software may allow window positions to be associated and “saved” with particular users. A user may create roles or add individual people to a preferences list to allow for different instant messaging window preferences for each role or person. In this manner, a user may specify areas of the display in which an instant messaging dialog window may open according to the various roles.
摘要:
A method, computer program product and system for detecting previously installed applications on a system. An installer program may invoke an application programming interface to call a software component, referred to as a “manager”, to detect previously installed applications on the system. The manager may be configured to query detection mechanisms, referred to as “collectors”, to perform their own detection techniques to detect applications installed on the system. Since each collector may perform its own unique detection technique, the collectors may be used together to detect more applications installed on the system than if the installer program attempted to detect the applications installed on the system by itself.